Summarize three different communications media

Assignment Help Basic Computer Science
Reference no: EM132788762

Project Communications Management

Several issues have arisen on the Recreation and Wellness Intranet Project. The person from the HR department who was supporting the project left the company, and now the team needs more support from that group. A member of the user group that supports the project is extremely vocal and hard to work with, and other users can hardly get a word in at meetings. The project manager, Tony, is getting weekly status reports from all of his team members, but many of them do not address obvious challenges that people are facing. The team is having difficulty deciding how to communicate various project reports and documents and where to store all of the information being generated. Recall that the team members include you, a programmer/analyst and aspiring project manager; Patrick, a network specialist; Nancy, a business analyst; and Bonnie, another programmer/analyst.

1. Summarize three different communications media that could be used for getting more support from the HR department and which you think would be most effective.

2. Prepare a partial communications management plan to address some of the challenges mentioned in the previous paragraph.

3. Prepare a sample of a good weekly progress report that could be used for this project. Include a list of tips to help team members provide information on these reports.

4. Write a paper describing two suggested approaches for communicating with the hard-to-work-with user.

Reference no: EM132788762

Questions Cloud

Create disaster recovery plan : You work for a large multinational technology organization. The company has determined they need to create a disaster recovery plan.
Business intelligence-con-ducting neural network project : List and briefly describe the nine-step process in con-ducting a neural network project.
Organization to implement data mining process : You are a data mining consultant hired by your organization to implement a data mining process.
Examine it infrastructure policies : You work for a large, private health care organization that has server, mainframe, and RSA user access.
Summarize three different communications media : Summarize three different communications media that could be used for getting more support from the HR department and which you think would be most effective.
What types of virtual desktops you would recommend : Details as to what types of virtual desktops you would recommend and why. What client hardware you would recommend and why
What are the different error handling methods : Error handling is an important part of creating web applications and scripts. What are the different error handling methods?
Sharing something unique about your background : Introduce yourself to your peers by sharing something unique about your background.
Describe the purpose of internal array pointer : Describe the purpose of the internal array pointer; provide an example of when you might need to use an internal array pointer with associative arrays.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the data breach incident

Write a three to five (3-5) page paper on your selected case in which you: Describe the data breach incident and the primary causes of the data breach.

  Implement the function swap

Implement the function swap, as described in Checkpoint Question 3, but remove the assumption that the i th and jth items on the list exist. Return a value that indicates whether the swap was successful.

  Every program in a system contains

Assume that every program in a system contains 40,000 machine code instructions. To execute an instruction it takes 4 machine cycles. Assume that a computer constantly keeps 150 active processes in execution and each active process needs to be exe..

  Discuss concept of the static recursive method

Write a static recursive method that returns the number of digits in the integer passed to it as an argument of type int.

  Describe the structure of the world wide web

Describe the structure of the World Wide Web as interconnected hypertext documents and create and validate HTML documents - create presentations using Cascading Style Sheets and DHTML.

  How can a core protect itself from illegal data

Imagine students experimenting with a router that attaches a local area network to an internet that has a core routing system.

  Gail industries case study

Analyze key aspects of IT governance, including enterprise resource planning and transaction processing systems.

  Ieee single-precision real

1. Convert the decimal value 7.5 to IEEE single-precision real.

  It audit profession continues to grow

Discuss educational opportunities for those just entering the profession or those looking for growth.

  Demonstrate that the following fas are equivalent

For each of the following pairs of regular languages, find a regular expression and a Finite Automata (FA) that each define L1 intersection L2.

  Undertaking an international capital investment

What additional considerations are there for the cash flows and the rate of return? What incentives or barriers are given by the foreign government?

  Prove that there are as many palindromes of length

Determine the number of palindromes of length 2n defined over the same alphabet as well.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd