Preview

Is3350 Unit 1 Assignment

Best Essays
Open Document
Open Document
3307 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3350 Unit 1 Assignment
Table of Contents
Task 1 2
1.1 Network Diagram 2
1.2. Calculating Time of Activities & Total Float: 3
1.3. Project Duration and Critical Path: 3
1.4. Earliest Finish Date of the Project, if started on 16th January, 2012: 4
1.5. Effect of delaying events on the duration of the whole Project: 4
1.6. Limitations of Network diagram 4
Task 2 5
2.1 Project Management 5
2.2 Project Life Cycle 5
Conceptual 5
Planning 5
Execution 6
Termination 6
2.3 Project Manager 6
2.4 Feasibility Report 7
2.5 Conclusion 8
References 10

Task 1
1.1 Network Diagram

1.2. Calculating Time of Activities & Total Float:
In order to calculate the timing of an activity ‘Duration’ of the activity needs to be summed up with the ‘Earliest Finish
…show more content…
With the expansion of its business Jimaga Limited now faces a need to widen the existing structure of its operation with the opening of a new building. As the company is growing a shortfall of managing resources and the challenge of meeting the customer’s demand is faced by the company, it is due this reason that they have now decided to move into a larger, more advance and organised premises providing them facilities to fulfil the required tasks and responsibilities and allow the organisation to grow.
For this purpose the company has hired our services in order to manage the whole project. This project is to be split into two major parts; first, the construction of a new premises and second, the transfer of resources from old to new premises. The project manager therefore, needs to plan the whole project first with taking all areas of the project into consideration so that nothing is left behind one of the most reliable and suggested to do this is through using the Work Breakdown Structure (WBS). This will allow the manager to have a wide-ranging grip into all concerned areas of the project, by breaking the project into smaller tasks and assigning these tasks to individuals who are considered most suitable for them. This will enhance the level of specialisation and expertise implied into the project by planning all the phases of the project with specialised human as well as capital

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Sc235 Unit 4 Assignment

    • 440 Words
    • 2 Pages

    The heart is what some determine to be the most important organ in our bodies and one of the biggest contributors. It is one of the major organs that if we did not have, it would not be possible for us to live. The heart is about the size of a fist and is broken down into four chambers, the aorta, superior vena cava, pulmonary artery, and the coronary artery. The four chambers include the right and left atrium and the right and left ventricle. The heart is responsible for supplying oxygen and blood to the entire body. Blood passes through these four chambers and then exits and pumps into the rest of the body. The heart also has three layers of walls…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finding 1: Using the estimated times collected by the project team, the preliminary information for activities with duration times and predecessors can be seen in the Activity-on-Node (AON) model that…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The U.S. Federal and State compliance laws in regards to data protection affect all financial institutions in that non-compliance will result in fines and penalties. ABS Financial Solutions handles sensitive data for many credit unions and without regulations governing data security there would be no repercussions when private information is mishandled, lost or stolen. ABS understands their responsibility for protecting their client’s data and the threat of the retribution both federal and civil for non-compliance ensures they take appropriate security precautions.…

    • 407 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Violating my copyright privileges is definitely not a good thing. I am all for sharing music. If music was not shared, some of the smaller acts would never be recognized. As for my scenario my employment and income is based off of music sales. In this case I am not okay with it.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    <<The Project Management Plan is a formal and approved artifact that addresses the project’s various planning processes to create a consistent, coherent plan that will be used to guide project execution. The scope of the activities covered by this artifact includes…

    • 2557 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Work Breakdown Structure

    • 563 Words
    • 3 Pages

    Work breakdown structure is used to break the whole project into small work categories. It will help to well plan the project and complete the project easily and successfully. Therefore the work breakdown structure is very helpful to complete the proposed project successfully. And also this work breakdown structure helps to complete the project step by step. Work breakdown structure for this proposed business is as follow…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The project plan was very well defined and each section of the project plan is clear and concise paying particular attention to detail. Each Phase of the project is completely broken down step by step in the WBS and the key personnel for each phase is listed. The cost analysis is sound and extremely detailed. This allows the key shareholders to closely follow the budget and still have the project meet their needs. Personnel needs are clearly defined with specific job requirements as well as outside staffing needs. The communications plan is detail oriented and ensures that lines of communication are open for the duration of the project…

    • 534 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Step 3: All the work package information should be reviewed with the individuals or organizations who have responsibility for doing or supporting the work in order to verify the Work Breakdown Structure's accuracy. Next, the resource requirements, schedules, and subtask relationships can be aggregated to form the next higher level of the Work Breakdown Structure and continued on to each succeeding level of the hierarchy. At the uppermost level, there should be a summary of the project, its budget, and an estimate of the duration of each work element.…

    • 587 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Work Breakdown Structure

    • 1552 Words
    • 7 Pages

    If guidelines for developing a work breakdown structure exist, it is important to follow them. Some organizations prescribe the form and content for work breakdown structures for particular projects. Many projects for the U.S. Government require contractors to prepare their proposals based on the U.S. Government provided work breakdown structure. These proposals must include cost estimates for each task in the work breakdown structure at a detailed and summary level. The cost for the entire project must be calculated by summing all the costs of all the lower level work breakdown structure tasks. When the U.S. Government personnel evaluate cost proposals, they must compare the contractors costs with their own estimates. A larger variation in costs for a certain work breakdown structure task sometimes indicates confusion as to what work must be accomplished.…

    • 1552 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    managing projects

    • 3062 Words
    • 13 Pages

    The latest finish time can be calculated as the addition of duration to latest start time of activity and the equation can be written as under:…

    • 3062 Words
    • 13 Pages
    Powerful Essays