1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
5

Why is project scope management so challenging in IT projects? What suggestions do you have for preventing scope creep in projec

ts? What did you think about the approach Northwest Airlines used for improving user input and reducing scope changes on their reservation system project?
Computers and Technology
1 answer:
seropon [69]3 years ago
6 0

Answer:

Explanation:

<u>Ways to Avoid Scope Creep</u>

Scope creep is what happens when changes are made to the scope of a project without any control. Changes happen to projects all the time without been notify ontime as a project manager. It is that very rare project that ends up delivering exactly what was asked for on the first day. However, without there being some control over the changes, a project manager has little chance of keeping on top of the work and managing the project effectively.

Generally, scope creep is when new requirements are added after the project has commence. These changes are not properly reviewed. The project team is expected to deliver them with the same resources and in the same time as the original scope.

On the other hand, as a project manager you could end up with a project with lots of approved, considered changes, that never ends because every time you think you have finished a new requirement arrives in your inbox and you have to make more changes.

The following are five ways to keep control of your project.

<em>1-Document the Requirements</em>

<em>2-Set up Change Control Processes</em>

<em>3-Create a Clear Project Schedule</em>

<em>4-Verify the Scope with the Stakeholders</em>

<em>5-Engage the Project Team</em>

You might be interested in
Dotted Decimal Notation was created to______________. Group of answer choices provide an alternative to IP addressing express ea
BaLLatris [955]

Answer:

Both b and c

Explanation:

Dotted Decimal notation is a presentation of numerical data which is expressed as decimal numbers separated by full stops. Dotted decimal notation expresses each eight bit sections of 32 bit numbers as decimal value. It provides convenient notation which is easy to understand by the people who are IT experts.

3 0
3 years ago
Ok. So i am so confused. I have a message in my inbox but when I try to go to my inbox there is nothing there. Is that normal fo
GrogVix [38]

Answer:

yeah

Explanation:

that happens to me as well from time to time

7 0
3 years ago
Which term collectively describes hard disks, CDs, and flash drives?
mamaluj [8]

Answer:

Auxiliary storage

Answer. Answer: Auxiliary storage is the term collectively describing the hard disks, CDs, and flash drives. Auxiliary storage is any storage which is made available through input / output channels to the device.

4 0
3 years ago
The resistance in a particular kind of circuit is found using this formula: R1(R2)R1+R2.
jenyasd209 [6]

Answer:

resistance = (R1 * R2) / (R1 + R2)

Explanation:

PYTHON doesn't recognize multiplication like this example >> 3(4)

This is why PYTHON uses this symbol (*)

3 0
3 years ago
Study the sentence below
Tanzania [10]

Answer:

call

Explanation:

call is a way for a person to draw attention to the way a person conveys information to someone he wants.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Does group policy management matter without a server environment?
    7·1 answer
  • Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s
    13·2 answers
  • Which statement pertaining to system reliability is FALSE? Select one: A. Having the latest version of software products can mak
    15·1 answer
  • ICS facilitates the ability to communicate by using:
    7·1 answer
  • Consider two communication technologies that use the same bandwidth, but Technology B has twice the SNR of technology A. If tech
    14·1 answer
  • In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
    14·2 answers
  • Select the correct answer.
    9·2 answers
  • A unit of measurement that describe the rate that electricity flows through a wire is an
    14·1 answer
  • ...................is a high level, structured , open source programming language​
    10·1 answer
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!