Reference no: EM133684431
IT Project Management
Answer the Following Questions
Question 1: Given the time-phased work packages and network, complete the baseline budget form for the project.
Question 2: How can outsourcing project work alleviate the three most common problems associated with Multiproject resource scheduling? Briefly explain.
Question 3: A software company is tasked with developing a new mobile application within a tight deadline. The project involves various stages such as design, development, testing, and deployment. Project faces some challenges which are given below.
Deadline constraint: The project must be completed within 6 months to meet market demands and stay ahead of competitors.
Resource constraints: Limited availability of developers and specialized software tools may impact project progress.
Given the limited availability of developers and specialized tools, how would you optimize resource scheduling to maximize efficiency and meet project deadlines within the 6-month timeframe? Briefly explain.
Weekly Activity
Use the ACS Code of Professional Conduct V.2.1 to formulate answers for the following 3 scenarios (150 words for each scenario, 450 words in total).
Scenario 1
- Sarah is an IT security specialist working for a large multinational corporation. Her role involves safeguarding the company's digital assets, protecting sensitive data, and ensuring compliance with cyber security regulations.
- One day, Sarah discovers a vulnerability in the company's network infrastructure that could potentially expose confidential customer information to hackers. Upon further investigation, she realizes that fixing the vulnerability would require significant time and resources. as well as temporarily disrupting critical business operations. However. failing to address the vulnerability could lead to a data breach, compromising the privacy and security of the company's customers.
- What Sarah should do? Refer to ACS code and justify your suggestion.
Your answer should be about 150 words. If you used any external resources. you must cite and reference them.
Scenario 2
Pradeep, a statistical database programmer, is trying to write a large statistical program needed by his company. Programmers in this company are encouraged to write about their work and to publish their algorithms in professional journals. After months of tedious programming, Pradeep has found himself stuck on several parts of the program. His manager, not recognizing the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Pradeep remembers that a co-worker had given him source listings from his current work and from an early version of a commercial software package developed at another company.
On studying these programs, he sees two areas of code which could be directly incorporated into his own program. He uses segments of code from both his co-worker and the commercial software, but does not tell anyone or mention it in the documentation. He completes the project and turns it in a day ahead of time.
Scenario 3
John works as a data analyst for a large e-commerce company. His role involves jig customer data to improve marketing strategies and personalize user experiences on the company's website and mobile app.
While anal ig the data, John discovers that the company's data collection practices may be infringing on customer privacy. He finds that the company is collecting more data than necessary for its operations, including sensitive information such as browsing history, location data, and personal preferences, without obtaining explicit consent from users. Furthermore, there are indications that this data might be shared with third-party advertisers for targeted advertising purposes without the knowledge of the users.
- What John should do? Refer to the ACS code and justify your suggestion.
- Your answer should be about 150 words. If you used any external resources, you must cite and reference them. Answers generated by Al tools will not be acceptable.
Normalization of Database Tables
What is normalization? When is a table in 1NF?
Given the dependency diagram shown in Figure 1, answer the following questions
Identify and discuss each of the indicated dependencies
Create a database whose tables are at least in 2NF, showing the dependency diagrams for each table.
Create a database whose tables are at least in 3NF, showing the dependency diagrams for each table.
The dependency diagram in Fig 2 indicates that a patient can receive many prescriptions for one or more medicines over time. Based on the dependency diagram, create a database whose tables are in at least 2NF, showing the dependency diagram for each table.
What is a partial dependency? With what normal form is it associated?
What three data anomalies are likely to be the result of data redundancy? How can such anomalies be eliminated?