Reference no: EM132265543
Question: 1. What are the main processes involved in project time management? In your words please describe them to help students in high school to perform their final project?
Hint:What's really challenging here that the language and description of each process should be easy and understandable by students did not study project management subject at all. (show me your innovative ways to transfer your experience and knowledge in stating, defining, and illustrating (graphs may be used).
2. Suppose a project X is half completed by the end of first month.Upto this duration the rate of performance is 50 percent.
Complete the below table by using given values and explain about the budget and schedule on the basis of calculations.
Earned value calculations for project X after 1 month are as follows:
PV=8000 SR AC=20000 SR RP=50%
Project X
|
Duration (1 Month)
|
Earned Value (EV)
|
|
Planned Value (PV)
|
|
Actual cost (AC)
|
|
Cost Variance (CV)
|
|
Schedule Variance (SV)
|
|
Cost Performance Index (CPI)
|
|
Schedule Performance Index (SPI)
|
|
3. Describe Testing tasks in the software development life cycle?
4. The following table shows the tasks, dependencies, and estimated times a project manager might input. Please use the details below to draw a GANTT chart for a software development project? (The project Starting date 12/06/2019)
Task Identifier
|
Task Description
|
Predecessor Task(s)
|
Time (days)
|
1
|
Establish project
|
-
|
2
|
2
|
Establish customer requirements
|
1
|
3
|
3
|
Produce software specification documents
|
2
|
4
|
4
|
Write test plans
|
3
|
1
|
5
|
Write code
|
3
|
2
|
6
|
Developer testing
|
5
|
2
|
7
|
System testing
|
4,6
|
4
|
8
|
Write customer documentation
|
3
|
3
|
How KPI and Artificial intelligence have helped
: Need content on atleast 4 mobile apps, how KPI and Artificial intelligence have helped them to build. Need around 15-16 slides apart from the intro.
|
Modify and complete the function asn2
: 1. Complete the function asn2_1() so it prints the string that is passed to it as a parameter.
|
What are the three parameters needed in the goal seek
: What are the three parameters needed in the Goal Seek section of What-if Analysis? Explain each of them and what they do.
|
Topic of net neutrality
: Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic.
|
What are main processes involved in project time management
: What are the main processes involved in project time management? In your words please describe them to help students in high school to perform their final.
|
Identify and explain security and counter-terrorism measures
: Identify and explain security and counter-terrorism measures in relation to your selected type of terrorism.
|
Discuss the concept of democratic government
: Discuss the concept of democratic government (both direct and indirect) and compare and contrast democracy with other forms of government.
|
What modern security methods and tools can be used
: There are hundreds of thousands of potential cybersecurity attacks, which exist in the form of hackers, viruses, malware, ransomware, and other vectors.
|
Explain the theories of operations security
: ISOL631– Operations Security University of the Cumberlands Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills.
|