Earned value analysis, Computer Engineering

Assignment Help:

Senior management has requested a status update on the workstation installation project.  As a part of this update, managers have requested that you present an Earned Value analysis.

I have imagined three scenarios for project cost and schedule metrics that could have occurred for this project, shown in Table 3 below.  As of the end of the reporting period, according to the original schedule, you were expecting to have completed all work through Activity I.    

  1. Calculate the values indicated in Table 2 for each of the three scenarios and provide a verbal interpretation of what each answer means.  I have filled in the first answer as an example of what senior management expects.
  2. Provide a written interpretation of the results.  For each scenario: 
    1. What would be the implications for managing the project (e.g., corrective actions, if any)?
    2. What statement would need to be made to the project stakeholders?

Be sure to take into account all work completed to date in making your calculations, even if the work was not scheduled to be completed at this time (i.e., is ahead of schedule).  Use the assumption that the project can take credit for partially complete work. (Hint: for Scenario 3, take into account the partial work done on Task  J).

Use the ETC based on typical variances and the EAC using CPI methods for computing ETC and EAC (See pp. 181-187 of the PMBOK Guide and pp. 247-253 of Marchewka).  Note: there is an error in Marchewka on page 251 - ETC should be Estimate to Complete.

Some additional project notes (in response to questions posed by previous classes):

The deliverable is to fill out the matrix of earned value calculations for each of the three scenarios, given the information provided in Table 3.  I recommend that you use Excel or another spreadsheet program to do the calculations, using the standard formulas as shown in Marchewka and the PMBOK Guide. 

Each of the scenarios should give you slightly different results for most of the calculations, especially those for cost and schedule performance. 

Also, it is important that you use the ETC based on typical variances and the EAC using CPI calculations per the assignment instructions, otherwise you will arrive at different answers than I have calculated in the answer key.

I filled in the answer for the first calculation which, based on the assignment, indicated that the expected work to have been completed at this point in the hypothetical project was through Activity I.  In performing your calculations, assume that the percentages complete are correct for all activities as of the date you are preparing the table, and give credit for any work that has been partially completed, even if it is ahead of schedule.


Related Discussions:- Earned value analysis

Database management system, what is time out based schemes in concurrency c...

what is time out based schemes in concurrency control

Command line argument value, Make a console application to show different m...

Make a console application to show different messages depending on the command line argument value. Use Select-case statements.(same to switch block)

Greedy search - artificial intelligence, Greedy Search - artificial intelli...

Greedy Search - artificial intelligence: If we have a heuristic function for states, defined as above, so we can simply measure each state with respect to this measure and ord

What is a program counter, It is a 16 bit special function register in the ...

It is a 16 bit special function register in the 8085 microprocessor. It remains track of the next memory address of the instruction that is to be implemented once the implementatio

What are the five popular hashing functions, Five popular hashing functions...

Five popular hashing functions are as follows:- Division Method Midsquare Method Folding Method Multiplicative method Digit Analysis

Fundamental change to the cloud to support mobility, Question: The abun...

Question: The abundance of resources and the ease of access to cloud computing can help to bridge the gap the resource gap for mobile computing. Nevertheless some fundamental c

Host computer-array processing, Host Computer:  An array processor may be a...

Host Computer:  An array processor may be attached to a host computer by the control unit. The reason of the host computer is to broadcast a sequence of vector instructions by CU t

Performance evaluation-parallel computing, Performance Evaluation In th...

Performance Evaluation In this part, we talk about the primary attributes used to measure the performance of a computer system. Unit 2 of block 3 is totally devoted to performa

Password, A phonetic password generator picks two segments randomly for eac...

A phonetic password generator picks two segments randomly for each six letter password. form is CVC. what is the total password population? 1> what is the total password population

Program for interchanging the values of two memory locations, Q. Program fo...

Q. Program for interchanging the values of two Memory locations? Program for interchanging the values of two Memory locations  ; input: Two memory variables of same size:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd