Self reflection

Assignment Help Basic Computer Science
Reference no: EM132877017

Throughout this semester, you worked on a Running Case in the textbook as the semester project. The semester project presentation is to demonstrate the knowledge and skills accumulated in this course and your reflection of the semester.

Tasks:

1. Create a document in which you describe your self-reflection on this course (20 points):

o What knowledge and skills you learned?

o Which knowledge/skills that you believe are useful in your future life/career? and

o Which topic(s) you wish to have spent more time on practicing?

Topics

Module-2 = Project management and IT context

Module- 3 = Project integration management and scope management

Module- 4= Project time management and cost management

Module- 5 = Project quality management and HR management

Module- 6 = Project communications management and risk management

This course is = Infosystems Project management

Reference no: EM132877017

Questions Cloud

Discussing how blockchain implementation : Discussing how a blockchain implementation would improve data security in the military, education, or another context.
What would policy look like and why : As a health care professional, you may be asked to educate others on privacy and create policy relating to social media use. What would your policy look like?
Journalize entries to record transactions of Gourmet Company : Purchase-related transactions - Journalize the entries to record the transactions of Gourmet Company for January
List three properties of isoquant curves : Outline the factors that may lead to the occurrence and persistence of a a market disequilibrium.
Self reflection : Throughout this semester, you worked on a Running Case in the textbook as the semester project.
Journalize entries to record transactions of Artic Supply Co : Jan. 12. Received check for amount due from Mammoth Co. for sale on January 2. Journalize entries to record transactions of Artic Supply Co
Determinants of successful security policies : Deeply examine the determinants of successful security policies, including but not limited to the legal and regulatory environments in which these policies
Journalize entries for transactions of Blue Moon Company : Purchase-related transactions - Journalize entries for the following related transactions of Blue Moon Company: Discovered that $10,000 of the merchandise
How would deliver information to existing staff : As a leader, how would you deliver this information to your existing staff? For example, how would you introduce this project to your staff?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What step it plays in implementing the prodecure''s body

Most C and Java compilers provide an option to display the assembly instructions that are generated. Compile the following procedure on your favorite C or Java compiler and get a listing of the code generated for it. Examine each instruction and e..

  Understanding the complexities of administration enterprise

Understanding the complexities of administration enterprise, discuss how an uncaring or unprepared administrator can cripple business operations

  Give reasons why this is good for users

Explain why this is bad for users. Now give reasons why this is good for users.

  Which act confirms the identity of a user or system

Which fallback authentication is used when Kerberos does not work?

  Assume the friction coefficient between the rope and capstan

How many wraps around the capstan are required such that one person exerting 100lbs of force can keep the ship at its mooring. Assume the friction coefficient between the rope and capstan is 0.2.

  Will the optimum route change

If the salesman has to return to the starting city at the end of his journey, will the optimum route change? (Justify the answer through optimization)

  Management to secure laptop computer

You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company

  How would you go about determining accuracy

How would you ensure the highest level of accuracy with your simulation, and how would you go about determining accuracy?

  Element-wise multiplication of two vectors in another vector

A multiplication (*) operators returns element-wise multiplication of two vectors in another vector. Given two sparse vectors, A and B, and a result vector C, a

  Significant impact on businesses and industries

We have viewed how Blockchain has made a significant impact on businesses and industries.

  In corporate-networked setting

In a corporate, networked setting, should end users be allowed to install applications on their company workstations,

  How employees use devices with different operating

As an IT professional, how would the knowledge of how employees use devices with different operating systems and apps affect the way you would support colleague

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd