Friday, February 21, 2020

PM to rescue a project in trouble Assignment Example | Topics and Well Written Essays - 1000 words

PM to rescue a project in trouble - Assignment Example To ensure that one takes the right action, the cost expenditure in a project has to be measured consistently and accurately. The certainty of cost can be attained if all project activities are completed properly. There are a number of factors that can directly have an impact of a project’s final cost compared to the original budget plan on cost. Project changes and this involves unforeseen events, scope, execution method and levels of specification. There is also schedule whereby the sooner the completion of a project, the sooner a project does not incur costs. The foreseen events is another factor which means that although the original plan on cost where contingencies and risks are concerned, events can take place as foreseen although with a different impact on the affected cost elements. The control schedule enables a person to understand the variance nature and its cause, capturing of current schedule, determining the variance from the baseline of the schedule and responding by taking relevant measures. The control schedule helps to monitor and control a group by influencing what changes to be made before a project is affected. The control schedule keeps the expectations of a managing stakeholder through advice on the type of work, how it should be carried out, which members to carry it out, and the duration of time it will take. The control schedule gives advice on when a project can be reviewed and when the authorized product to be complete. Schedule management plan defines how a control schedule can be changed and managed. It articulates the variances of schedule performance thus defining the circumstances when schedule reserve can be used. Project schedule is a major and obvious input to control schedule since it consists of a daily schedule used to monitor and keep track of project work thus giving resource against results being managed as well as

Wednesday, February 5, 2020

Software System Development Essay Example | Topics and Well Written Essays - 1250 words

Software System Development - Essay Example This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker". The nuclear power plant's project manager who has already entered into contract with the software house should have considered all the aspects of software house before awarding the contract. Though the nuclear power plant has every right to question and demand the details of the employees working with the software house, however the software house need not provide the data as they feel it as a trade secret. The Project Manager being a higher official is not entitled to hack the database of the supplier company and grab the details on the basis of ex-employees information. This is a bad practice on the part of buyer. This type of action would affect buyer-seller relationship among the firms. For effective business process the exchange partners should have mutual trust and cooperation. According to Moorman, Deshpande, and Zaltman (Moorman et al, 1993) trust is willingness to rely on an exchange partner in whom one has confidence. According to Achrol (Achrol et al, 1991), Morgan and Hunt trust is a major determinant of relationship commitment. Thus the decision of Project Manager to hack the database of software house can be considered as breach of trust. The Project Manager instead of hacking the database can demand the software house to prove their employees skills to complete the project through negotiations. It would be onus duty on the part of supplier to prove his capabilities. The action of hacking is against legal procedures and the trespasser can be prosecuted under the following cyber laws: Under Computer Fraud and Abuse Act (as amended Oct. 3, 1996) section 1030,a hacker is liable to be punished for knowingly and intent to defraud, accesses a protected computer without authorization In Western Australia under section 440A of criminal code under the heading 'unlawful operation of a computer system'. The hacker can be prosecuted. (www.aic.gov.au ,11,2006) References 1. Network Security and Ethical Hacking by Rajat Khare, 1st Edition, 2006. 2. Factors affecting the trust in market research relationships by Moorman, Deshpande, and Zaltman. Journal of Marketing, 57(January), 81-101. 3. Evolution of the marketing organization by Achrol .Journal of Marketing, 55(October), 77-93. Answer 2 System Development Life Cycle (SLDC) is a structure imposed on the development of a software product. SLDC has three primary objectives: ensure that high quality systems are delivered, providing strong management controls over the projects, and maximize the productivity of the systems staff. In order to meet these objectives the SLDC has many specific requirements it must meet including: being able to support projects and systems of various scopes and types, supporting all of the technical activities, supporting all of the management activities, being highly usable, and providing guidance on how to install it. The technical activities include system definition, that is, analysis, design, coding, testing, system installation ( Training, data