1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
5

Why is project scope management so challenging in IT projects? What suggestions do you have for preventing scope creep in projec

ts? What did you think about the approach Northwest Airlines used for improving user input and reducing scope changes on their reservation system project?
Computers and Technology
1 answer:
seropon [69]3 years ago
6 0

Answer:

Explanation:

<u>Ways to Avoid Scope Creep</u>

Scope creep is what happens when changes are made to the scope of a project without any control. Changes happen to projects all the time without been notify ontime as a project manager. It is that very rare project that ends up delivering exactly what was asked for on the first day. However, without there being some control over the changes, a project manager has little chance of keeping on top of the work and managing the project effectively.

Generally, scope creep is when new requirements are added after the project has commence. These changes are not properly reviewed. The project team is expected to deliver them with the same resources and in the same time as the original scope.

On the other hand, as a project manager you could end up with a project with lots of approved, considered changes, that never ends because every time you think you have finished a new requirement arrives in your inbox and you have to make more changes.

The following are five ways to keep control of your project.

<em>1-Document the Requirements</em>

<em>2-Set up Change Control Processes</em>

<em>3-Create a Clear Project Schedule</em>

<em>4-Verify the Scope with the Stakeholders</em>

<em>5-Engage the Project Team</em>

You might be interested in
what evidence supports the claims that the Taj Mahal is a symbol of historical and cultural glory as well as an architectural ma
belka [17]

Answer:

Taj Mahal

Explanation:

The Taj Mahal is best described in the book; World Wonders Worn Down by Cody Crane.

Go to Page 14 of the attached pdf document and you'd find the write up by Jeffery Batholet.

Cheers

Download pdf
8 0
3 years ago
Which of these is NOT an example of a GUI?
aksik [14]

Answer:

The answer to this question is given below in the explanation section.  

Explanation:

First, we need to know what is the graphic user interface (GUI)?

A GUI is a form of user interface that allows the users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of a text-based user interface as in MS-DOS. Users interact through such devices using their icon, navigation using the mouse cursor, etc , and touching. In short, an interface that has graphical options.

so, in the context of the question, the following are examples of GUI.

Virus protection software: Because virus protection software has a graphical interface and user can use it easily by using its graphics and exploration functionality.

Icon: icon is an example of GUI because ICON built on other many graphics parts. In short, the icon is part of the GUI.

The followings are not the example of GUI:

Microphone and USB cord because these are the electronic parts and they don't possess the GUI.

5 0
2 years ago
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone w
Setler79 [48]

The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

<h3>What is the network about?</h3>

Broad network access is known to be a feature of cloud computing as it is seen as  the ability of network tools to be able to link with a large scope or variety of devices.

Note that The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

Learn more about cloud technology from

brainly.com/question/19057393

#SPJ1

5 0
2 years ago
An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
nalin [4]

Answer:

RADIUS

Explanation:

RADIUS is the networking protocol that is used for the purpose of authentication to access the network resources. The full form of RADIUS is Remote Authentication Dial In User Service. It is used by different organizations, which setup their own network that can be accessible through VPN, DSL or modems through different networks. The purpose of this protocol is to establish the security and authentication mechanism by organization itself.

So, If an administrator needs to set up an authentication server for users connecting to a network through a VPN, he should establsih the RADIUS based Server.

3 0
3 years ago
PLZ HELP ME I WILL GIVE BRAINLIST!!! Why was the Internet originally constructed?
pochemuha

Answer:

C. to provide online search capabilities

Explanation:

The first workable prototype of the Internet came in the late 1960s with the creation of ARPANET, or the Advanced Research Projects Agency Network. Originally funded by the U.S. Department of Defense, ARPANET used packet switching to allow multiple computers to communicate on a single network.

5 0
3 years ago
Other questions:
  • What are the three business writing formats
    12·1 answer
  • Programmers insert documentation called facts into the program code.? <br> a. True <br> b. False
    9·1 answer
  • What is the relationship between a method and a function
    11·2 answers
  • When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
    10·1 answer
  • Write a couple of paragraph on 'limited government and its important'?​
    7·1 answer
  • How do governments correct for negative externalities?
    5·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • What is the computer that is similar to a destop but smaller in size
    8·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin wor
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!