1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
15

Charlie wants you to include the following topics in your presntation: an overview of project management and its hrity,a descrip

tion of the process, and an explanation of the most imporant terms and concepts. Charlie also wants you to describe task identifcation, various types of relationsships among tasks, and schedule development, He says you should show how Gantt and PERT/CPM charts are developed, and how hey can be used to plan, track , and control projects.Charlie also said that your presentation should include a specific example to illustrate all the main points.Assignments:1.Create a Microsoft powermpoint prentations that will meet the requirements that charlie outlined to you.2.Creat a Microsoft Word handout that will meet the requirements that Charlie outlined to you...3.Create a project management exampe with at least six tasks. Assign durations and task dependencies. AT least three of the tasks should be dependent on other taks. Use this example to display a Gantt Chart.4.USe the same data as Assignment 3 display a PERT/CPM chart.
Computers and Technology
1 answer:
maxonik [38]3 years ago
4 0

Answer:

Explanation:

Project management is the process of planning, designing and implementing a project in an organized way to achieve the goals of an organization.

The project management process includes various activities like,

Definition – Initializing the project, identifying the needs

Planning – Organizing the activities and schedule the tasks

Execution – Coordinating people and resources and implement the tasks

Control – Monitoring the implementations, ensuring the objectives and goals

Closing – Acceptance of the project.

Task identification:

• Tasks are derived from the project deliverables and the requirements of the deliverables and the goals.

• All activities required for a complete process are to be identified.

• Identify intermediate deliverables for each major component

Relationships among tasks

The tasks can be interrelated. Start of completion of one task may depend on the start or end of another task. There can be four types of relationships among the tasks. They are:

• Finish-to-start – Task (B) cannot start until task (A) finishes

• Start-to-Start - Task (B) cannot start until task (A) starts

• Finish-to-Finish - Task (B) cannot finish until task (A) finishes

• Start-to-Finish - Task (B) cannot finish until task (A) starts

Schedule development:

Schedule development depends on the requirement, resources, duration and end date of the project. It provides a basis for monitoring the project progress.

• Gantt chart, PERT, CPM are the tools used to represent the project schedule.

• Gantt chart is the common tool for displaying project schedule information. They are easy to create and understand.

• These tools are useful at many stages of project management.

• They give critical path and slack time. Provide project documentation. They are useful in monitoring costs

You might be interested in
In what country was the English royal family and nobility living before the Restoration?
krek1111 [17]

im not sure to be exact , but i think its england. i have done an assignment in the past and that was the awnser.....hope i help                      

4 0
3 years ago
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
Education leads to higher wages lower unemployment.* True or false
natta225 [31]

Answer:

True

Explanation:

I would say True but I don't really know a Explanation. but if they have education then they must know more so they get paid more.

5 0
3 years ago
Create a class called Jack that extends Leo. This class must have the following behaviors/methods. You must use the inheritance
lara [203]

Answer:

public class Leo{

public String method1(){

return "Jack 1 Leo 1";

}

public String method2(){

return "Don 2 Jack 2";

}

public String method3(){

return "Jack 3 Leo 3 Don 2";

}

public String toString(){

return "Jack 3 Leo 1"

}

}

public class Jack extends Leo{

}

Explanation:

Leo is the parent class and jack inherits all of its attributes from Leo

So when you call the following code in the main method:

Jack j = new Jack();

System.out.println(j.method1);

it should print Jack 1 Leo 1

This is because the program first checks if method 1 exists in the Jack class

Because it doesn't exist it then goes to the parent class which is Leo.

And in the Leo class method1 displays "Jack 1 Leo 1 "

So it prints that

8 0
2 years ago
What do you understand by multitasking?Explain cooperativemultitasking ?
Nadusha1986 [10]

Answer: Multitasking is the ability of the operating system by which a processor is able to process multiple task at the same time.

Cooperative multitasking is non preemptive multitasking where the processor is assigned to a single process and does not preempt  until it completes its jobs or moves to a waiting state.

Explanation:

In Multitasking jobs are executed at a faster rate than as many jobs or tasks can be assigned to the processor at the same time.

In cooperative multitasking due to the non preemptive nature a single job could be assigned to the cpu at a time.  

4 0
3 years ago
Read 2 more answers
Other questions:
  • A species of snake lives in a rainforest. Which would be an adaptation for this
    10·2 answers
  • What are the core scripting and coding technolies used to build ai platforms?
    14·1 answer
  • Oracion con punto focal​
    6·1 answer
  • What is Computer categories
    9·1 answer
  • Code embedded into an HTML page and downloaded by a user; resides on the client and helps process Web form input. Common clients
    9·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • Write a short note on Computer<br>impact on<br> our society?​
    7·2 answers
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • Which one causes concerns for institutions or businesses when they are collected stores and they aren’t secured properly?
    5·1 answer
  • Write A Code In Python
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!