Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

You have been made the Chief Information Officer and Chief Technology Officer (CIO / CTO) of an innovative e-Commerce start-up company that a venture capital group has funded. The CEO has given you sixty (60) days to deliver an information technology project plan in anticipation of the company locating to a new facility. Since this is a start-up company, there is currently no building or technology infrastructure to support the business. All information technology (hardware and software) must be implemented in either a hosted solution, on-site solution or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices in connection with the development of technological systems. The new facility is a two-story stand-alone building. The company currently consists of ten (10) employees with revenues of $5 million but is expected to grow to thirty (30) employees with revenue of $30 million over the next two (2) years.

Section 1: Project Introduction

1.Write a two to four (2-4) page project introduction that includes the following:

a.Background information of the company.

b.The type of business in which the company is involved.

c.A description of the information systems that the company should have to support the business. The description should include the following:

i.databases

ii.systems analysis

iii.security

iv.networking

v.computer infrastructure

vi.human computer interaction

vii.Web design

d.The use of at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Section 2: Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2.Create a Gantt chart or project plan (summary and detailed) template. The Gantt chart or project plan should:

a.Record all tasks, subtasks, resources, and time related to the project.

b.Outline the planning, analysis, design, and implementation phases.

c.Develop in accordance with the systems development life cycle (SDLC).

The specific course learning outcomes associated with this assignment are:

Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.

Demonstrate the ability to evaluate organizational issues with integrative technological solutions.

Use technology and information resources to research issues in information technology.

Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92166621
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Outlinesubmit a one page outline with your proposed term

Outline: Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. Term paper on a computer related crime which can be solved by using ...

Final project guidelinesoverviewthe final project for this

Final Project Guidelines Overview The final project for this course is the creation of a communication framework and training plan. As businesses incorporate more and more technology into daily operations, information te ...

Question determine the necessary service level agreements

Question : Determine the necessary Service Level Agreements (SLA) needed from your carrier services, along with the quality of service expectations required. Consider how the SLA will affect business and how you will mea ...

In your role as information security consultant create a

In your role as information security consultant, create a strategy for an effective user training, access, and account management program for the project organization. This strategy should include the following component ...

Steve jobs was a strong charismatic leader who co-founded

Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. Some believe that Tim Cook, who became CEO in 2011, embraces a more collaborative leadership style ...

Question - this weeks reading included examinations of two

Question - This week's reading included examinations of two state initiatives to improve their health delivery systems. Both were well-intentioned. Both experienced unanticipated developments. Using what you've learned s ...

Promptidentify a news story or current event that

Prompt Identify a news story or current event that demonstrates a logical fallacy. Identify the fallacy and explain how it can be avoided. Also, be sure to explain why you believe logical fallacies are used, and what pur ...

Background kirk 2016 designed his text to help understand

Background: Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) discusses the following working with data steps: Data acquisition, data examination, data transformat ...

Identifying and analyzing vulnerabilities please respond to

"Identifying and Analyzing Vulnerabilities" Please respond to the following: Assess the effectiveness of offering a reward to individuals external to the organization in exchange for them to identify vulnerabilities on a ...

Assignmentas a member of the information security team at a

Assignment As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As