Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You have been asked to be the project manager for the development of an information technology (IT) project. The system to be developed will allow a large company to coordinate and maintain records of the professional development of its employees. The company has over 30,000 employees who are located in four sites: Florida, Colorado, Illinois, and Texas. The system needs to allow employees to locate and schedule professional development activities that are relevant to their positions. Sophisticated search capabilities are required, and the ability to add scheduled events to the employees' calendars is desired. The system needs to support social networking to allow employees to determine who is attending conferences and events. This will promote fostering relationships and ensure coverage of conferences that are considered of high importance.

Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications to management personnel whenever their direct reports have submitted documentation. The system should also notify employees if their deadline to complete professional-development requirements is approaching and is not yet satisfied:
The goal is to get this system up and running at the start of the next fiscal year.

For the given scenario, your group needs to complete the following:

Work together with role playing (one Project Manager, one customer, others may be system architects/developers) to identify the system requirements and all risks. And, rate each risk.

Each member selects one of the highest risks. Explain why these are considered high risk, and explain their potential effect on the project.
Outline a risk mitigation strategy for the each of the selected high risks.

Summarize the challenges the team faced and how you worked out.

Create a 10 - 15 pages PowerPoint presentation with audio narration which covers 1 - 4. Each member needs to add audio presentation at least for his/her selected risk.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9479177

Have any Question?


Related Questions in Computer Engineering

Not many applications use this type of direct connection ex

Not many applications use this type of direct connection (ex: ftp, ssh, tenet, smtp, httpd, pop) anymore unless it is within the corporate firewall. Why do you think this is? Pick 1 or 2 as example.

Mary kate is a project manager in the it department for a

Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create faculty intranet. The university has multiple campuses in various locations, and professors and other ...

When a source operand is ambiguous such as a value defined

When a source operand is ambiguous, such as a value defined as CR EQU 0DH, which can be either a 16 bit value or an 8 bit value, how can the ambiguity be removed. This is typical of an error staring "Is it byte or word?" ...

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Describe some of the advantages and disadvantages of using

Describe some of the advantages and disadvantages of using the N-version programming approach.

A decision maker has ordered every commodity in walmart

A decision maker has ordered every commodity in Walmart alphabetically according to the commodity's name. Every time when he needs to choose from several commodities, he always choose the second one according to his orde ...

Question what are some risks of the project development

Question : What are some risks of the project development process you might encounter and what can you do to mitigate or avoid the problems? The response must be typed, single spaced, must be in times new roman font (siz ...

Question what are the risks of transmitting data over an

Question : What are the risks of transmitting data over an unsecured Wi-Fi network? What steps are necessary to secure Wi-Fi Protected Access Network? Distinguish between client/server and file server architecture. Is te ...

What are some examples of marketing activities that are

What are some examples of "marketing" activities that are associated with the Summer Olympics? How does global marketing and the use of new digital marketing techniques facilitate marketing activities at the Olympics in ...

Discuss how cloud computing differs from computing on

Discuss how cloud computing differs from computing on physical machines. Identify how these differences affect the methods companies use to secure their cloud environment.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As