Which are the key risk areas for the project

Assignment Help Management Information Sys
Reference no: EM131242288

Consider the following scenario:

You are part of a software team which has three to four developers. This team has a contract with a larger software company, which has asked your team to design a complex software component that will work within a larger software application the firm is creating.

One of the key challenges in this project is its volatility. As software requirements tend to change, developers may leave your team or the company's group, and new programmers may be added during the software development. In addition, the company will need to integrate your component within their own very complex system.

Write a 3- to 5-page paper in Microsoft Word document covering the following points:

There are multiple SDLC methodologies for any software project. List and explain at least three of these approaches along with their respective advantages and disadvantages.

Which SDLC methodology will you use to develop this project? Why? Justify why you would use this approach versus any other approach.

Which are the key risk areas for the project? Illustrate.

How will you plan to manage, mitigate, and remove identified risk areas as part of your project plan?

There are multiple approaches to estimate the cost of any software project. List and explain at least two of these approaches? Explain the advantages and disadvantages of each approach.

Which approach will you use to estimate the overall cost of the project? Why? Justify your choice. Why do you think that other approaches will be less appropriate?

In addition to the above, create a complete Microsoft Project file for this project including tasks, sub tasks, resources, and dependency.

Support your responses with examples.

Cite any sources in APA format.

Reference no: EM131242288

Questions Cloud

Explain the importance of change and innovation to workforce : Explain the importance of change and innovation to the workforce. Explain the type of leadership approaches that you think are best to optimize the use of power and politics in your organization to support the change initiative.
Pushing the patient and gurney through a distance : 1. An intern pushes a 72 kg patient on a 15 kg gurney, producing an acceleration of 0.60 m/s^2.  A) How much work does the intern do by pushing the patient and gurney through a distance of 2.5 m? Assume the gurney moves without friction. B) How far..
Moves with constant acceleration : 1) A snowmobile is originally at the point with position vector 28.3 m at 95.0° counterclockwise from the x axis, moving with velocity 4.49 m/s at 40.0°. It moves with constant acceleration 1.94 m/s2 at 200°. After 5.00 s have elapsed, find the fo..
How would you analyze us treasury bills and promissory notes : How would you analyze US Treasury Bills, Promissory Notes, and Bonds? Is it necessary to have distinct debt securities such as these, why or why not?
Which are the key risk areas for the project : Which approach will you use to estimate the overall cost of the project? Why? Justify your choice. Why do you think that other approaches will be less appropriate?
Best estimate of the time : What value should you report for your best estimate of the time it takes to complete this assignment? (Enter your answer in seconds, but do not include units in your answer.)
How you might use the theory of leadership in a real world : Explain each theory of leadership. Provide an example of how you might use this theory of leadership in a real world situation.
How are stock price and earnings per share related : How are stock price and earnings per share related? If you were an investor, how would you analyze the performance of a publicly traded company?
Define the security strategies of defense in depth : Define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy. Support your informatio..

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is a distribution chain

What is a distribution chain? How is it relevant to the fulfillment process? Please ensure that your original response is at least 200 words and is supported with references.

  Which vulnerability should be evaluated

If an organization has three information assets to evaluate for risk management purposes as shown in the accompanying data, which vulnerability should be evaluated for additional controls first

  Reviewing and testing the code

Reviewing and Testing the Code, Create three misuse cases for the application. Diagram each misuse case and describe the misuse. How would the current system react to this misuse

  Write in a brief about knowledge management systems

Write in a brief about Knowledge management systems and definition and What is the system about?

  Many organizational considerations

Of the many organizational considerations that a project plan must address, choose three that you think are the most important and explain why. What might happen if any of them were eliminated from the project planning process?

  How can managers promote sound leadership

How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?

  Explain how to secure information systems resources

Identify at least three (3) problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one (1) solution to address each problem in question. Provide a rationale to support your res..

  Identifying and discussing several new it technologies

Write a 1,050- to 1,400-word paper, identifying and discussing several new IT technologies, including their strengths and weaknesses

  Supply chain managementwhat are some of functional

supply chain managementwhat are some of functional strategies that affect the supply chain? meaning what functional

  What are the disadvantages of cloud computing

Explain what are the "take-home messages" in the paper, and do you agree with them. What are the advantages and disadvantages of cloud computing. What are the challenges for the adoption of cloud computing in general.

  Packets routers and private vs public ip addresseswhat are

packets routers and private vs public ip addresseswhat are packets and routers? what is an ip address? describe the

  Question about internet privacywhat rights to privacy do

question about internet privacywhat rights to privacy do people have when using the internet at home? are there limits

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd