SlideShare a Scribd company logo
Task Mode
Task Name
Duration
Start Time
Finish
1
Set up project organization
3 days
Mon. 1/7/2020
Thu 4/7/2020
2
Create project plan draft
1 day
Fri 5/7/2020
Sat 6/7/2020
Nominate in house relocation coordinator
4 days
Sun 7/7/2020
Thu 11/7/2020
3
Planning
8 days
Fri 12/7/2020
Sat 20/7/2020
4
Requirements
5 days
Sun 25/7/2020
Fri 30/7/2020
5
Design and Prototype
10 days
Sat 31/7/2020
Wed 10/8/2020
6
Information system Development
22 days
Thu 11/8/2020
Mon 2/8/2020
7
Testing
5 days
Tue 3/8/2020
Sun 8/8/2020
8
Deployment
6 days
Mon 9/8/2020
Sun 15/8/2020
9
Operation and Maintenance
20 days
Mon 16/8/2020
Sun 6/9/2020
10
Project Summary/ System Hanover
7 days
Tue 8/9/2020
Tue 15/9/2020
1
Running Head: Information System Project Plan
2
Information System Project Plan
Project Plan
With only two years of operation, LiniolMR company has
experienced tremendous growth and a growing client base. The
company is expected to grow by sixty percent in the eighteen
months. With such growth, the company ought to increase the
capacity of data collection and analysis. An advanced
information system is to be developed in leveraging data
collection. The anticipated information will support the
business of the company.
The first task is to assess the current information technology in
the company, i.e., the hardware and software that support the
company’s operation. This will be done in the first two days of
the project. The hardware and software are redesigned to meet
the needs outlined by the organization. The team leader of the
project will consult several companies to allow the team to
integrate their technologies and IT solutions in connection with
the development of a technological system.
The on-site solution shall be leveraged in the development of
the information system. It is a great resource for the project as
it helps in delivering efficient, measurable, and engaging on-
site experiences without the limitation of complexity and size of
the events (Cha & Maytorena-Sanchez 2019). Reporting and
analytics will be done towards the end of the project. Cloud
computing technologies and software as-a-Service is of interest
in the project.
The cloud computing technology, i.e., the hardware, software,
and infrastructure will be incorporated in the system to enable
the delivery of cloud computing services like infrastructure as
service (IaaS), platform as a service(PaaS), and software as a
service(SaaS) through a chosen network like the internet. The
project will be pursued in different phases according to the
system development life cycle. These phases will mark the
project timelines for each event.
System planning is the first phase of the information system
development project. It is the most crucial stage in developing
an effective system. It will entail defining the objectives,
problem, and outlining the relevant resources, i.e., costs and
personnel. A study is conducted to identify how the product can
be developed better than the competitors in data collection and
analysis (Harris 2019). We also have to explore the ability to
propose an alternative solution after discussing it with the CEO.
Besides, in the planning phase, information is gathered from the
clients to create a system that will meet their needs. An analysis
is also conducted to assess the feasibility of the development of
the information system, and a software requirement
specification document is created. The document will guide the
developers in the entire process and can be reviewed by the
CEO and prospective clients. The determination and
documentation of the end user’s requirements mark the system
analysis.
After getting the users to need and identifying the project
resources, we proceed to the system design phase. This phase
defines the components, elements of the system, modules,
security levels, and architecture. We also have to identify
different interfaces as well as the types of data going through
the system. We can ease the system design by doing it on a
piece of paper to ascertain the outlook and functioning of the
system. An expanded and detailed system design can then be
produced as per the technical and functional requirements.
The system is then implemented and deployed after drawing the
system design. This phase follows after comprehending the
system requirements and specifications. The actual code is
written since the information system contains hardware
(Kennedy, 2019). The implementation phase encompasses fine-
tuning and configuration to ensure that the hardware meets the
specified functions and requirements. The system is ready for
installation and deployment in the company.
After the installation and deployment, different subsystems and
components are brought together to create an integrated system
as a whole. The system is introduced to various inputs to
acquire and analyze its behaviors, functions, and outputs.
Testing is essential for ensuring that the client is satisfied. It
can be pursued since it does not require any knowledge in
design, hardware configuration, or coding (Lemke 2018).
Testing will be performed by a team of specialized personnel in
a systemic and automated way to allow the comparison of the
actual outcomes with the desired or predicted results.
Periodic maintenance of the system is done in the system
maintenance phase. System maintenance entails continuous
evaluation of the system's performance and replacement of old
hardware. It is essential to also provide the latest updates for
some components to ensure that the system complies with the
latest technologies and the right standards to face the emerging
security threats.
Reference
Cha, J., & Maytorena-Sanchez, E. (2019). Prioritizing project
management competencies across the software project life
cycle. International Journal of Managing Projects in Business.
Harris, S. M. (2019). The Use of a Modified System
Development Life Cycle (MSDLC) in a Sociological
Environment to Improve
Solution
Validation (Doctoral dissertation, Morgan State University).
Kennedy, K. (2019). Development of QR Code-based Data
Sharing Web Application using System Development Life Cycle
Method (Doctoral dissertation, Universitas Internasional
Batam).
Lemke, G. (2018). The Software Development Life Cycle and
Its Application.

More Related Content

Similar to Task Mode Task Name DurationStart Time Finish1Set .docx

Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docx
jasoninnes20
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentation
sireesha nimmagadda
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Md Imran
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
bradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
deanmtaylor1545
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
rtodd599
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
jasoninnes20
 
Senior Capstone - Systems Operations Manual
Senior Capstone - Systems Operations ManualSenior Capstone - Systems Operations Manual
Senior Capstone - Systems Operations Manual
Kevin Kempton
 
G03503036044
G03503036044G03503036044
G03503036044
theijes
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
HARISHV863695
 
Project Review Management System
Project Review Management SystemProject Review Management System
Project Review Management System
IRJET Journal
 
Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...
zillesubhan
 
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docxTEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
mattinsonjanel
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
rtodd599
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
IJSRED
 
19701759 Project Report On Railway Reservation System By Amit Mittal
19701759 Project Report On Railway Reservation System By Amit Mittal19701759 Project Report On Railway Reservation System By Amit Mittal
19701759 Project Report On Railway Reservation System By Amit Mittal
Courtney Esco
 
Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)
ANISUR RAHMAN
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
50320140502003
5032014050200350320140502003
50320140502003
IAEME Publication
 

Similar to Task Mode Task Name DurationStart Time Finish1Set .docx (20)

Business Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docxBusiness Case Capstone IIConnie FarrisColorado T.docx
Business Case Capstone IIConnie FarrisColorado T.docx
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentation
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxBUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docx
 
Senior Capstone - Systems Operations Manual
Senior Capstone - Systems Operations ManualSenior Capstone - Systems Operations Manual
Senior Capstone - Systems Operations Manual
 
G03503036044
G03503036044G03503036044
G03503036044
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Project Review Management System
Project Review Management SystemProject Review Management System
Project Review Management System
 
Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...
 
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docxTEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
TEAM CAPSTONESECTIONS VI & VIIPROJECT MANAGE.docx
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
 
19701759 Project Report On Railway Reservation System By Amit Mittal
19701759 Project Report On Railway Reservation System By Amit Mittal19701759 Project Report On Railway Reservation System By Amit Mittal
19701759 Project Report On Railway Reservation System By Amit Mittal
 
Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
50320140502003
5032014050200350320140502003
50320140502003
 

More from josies1

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docx
josies1
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docx
josies1
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docx
josies1
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docx
josies1
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docx
josies1
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docx
josies1
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docx
josies1
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docx
josies1
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docx
josies1
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docx
josies1
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docx
josies1
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docx
josies1
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
josies1
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
josies1
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docx
josies1
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
josies1
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docx
josies1
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docx
josies1
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
josies1
 
Task 3 (16 Marks)The importance of accounti.docx
Task 3  (16 Marks)The importance of accounti.docxTask 3  (16 Marks)The importance of accounti.docx
Task 3 (16 Marks)The importance of accounti.docx
josies1
 

More from josies1 (20)

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docx
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docx
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docx
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docx
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docx
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docx
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docx
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docx
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docx
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docx
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docx
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docx
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docx
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docx
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docx
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
 
Task 3 (16 Marks)The importance of accounti.docx
Task 3  (16 Marks)The importance of accounti.docxTask 3  (16 Marks)The importance of accounti.docx
Task 3 (16 Marks)The importance of accounti.docx
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

Task Mode Task Name DurationStart Time Finish1Set .docx

  • 1. Task Mode Task Name Duration Start Time Finish 1 Set up project organization 3 days Mon. 1/7/2020 Thu 4/7/2020 2 Create project plan draft 1 day Fri 5/7/2020 Sat 6/7/2020 Nominate in house relocation coordinator 4 days Sun 7/7/2020 Thu 11/7/2020 3 Planning 8 days Fri 12/7/2020 Sat 20/7/2020 4 Requirements 5 days
  • 2. Sun 25/7/2020 Fri 30/7/2020 5 Design and Prototype 10 days Sat 31/7/2020 Wed 10/8/2020 6 Information system Development 22 days Thu 11/8/2020 Mon 2/8/2020 7 Testing 5 days Tue 3/8/2020 Sun 8/8/2020 8 Deployment 6 days Mon 9/8/2020 Sun 15/8/2020 9 Operation and Maintenance 20 days Mon 16/8/2020 Sun 6/9/2020 10 Project Summary/ System Hanover 7 days
  • 3. Tue 8/9/2020 Tue 15/9/2020 1 Running Head: Information System Project Plan 2 Information System Project Plan Project Plan With only two years of operation, LiniolMR company has experienced tremendous growth and a growing client base. The company is expected to grow by sixty percent in the eighteen months. With such growth, the company ought to increase the capacity of data collection and analysis. An advanced information system is to be developed in leveraging data collection. The anticipated information will support the business of the company. The first task is to assess the current information technology in the company, i.e., the hardware and software that support the company’s operation. This will be done in the first two days of the project. The hardware and software are redesigned to meet the needs outlined by the organization. The team leader of the project will consult several companies to allow the team to integrate their technologies and IT solutions in connection with the development of a technological system. The on-site solution shall be leveraged in the development of the information system. It is a great resource for the project as it helps in delivering efficient, measurable, and engaging on- site experiences without the limitation of complexity and size of the events (Cha & Maytorena-Sanchez 2019). Reporting and analytics will be done towards the end of the project. Cloud computing technologies and software as-a-Service is of interest in the project. The cloud computing technology, i.e., the hardware, software, and infrastructure will be incorporated in the system to enable
  • 4. the delivery of cloud computing services like infrastructure as service (IaaS), platform as a service(PaaS), and software as a service(SaaS) through a chosen network like the internet. The project will be pursued in different phases according to the system development life cycle. These phases will mark the project timelines for each event. System planning is the first phase of the information system development project. It is the most crucial stage in developing an effective system. It will entail defining the objectives, problem, and outlining the relevant resources, i.e., costs and personnel. A study is conducted to identify how the product can be developed better than the competitors in data collection and analysis (Harris 2019). We also have to explore the ability to propose an alternative solution after discussing it with the CEO. Besides, in the planning phase, information is gathered from the clients to create a system that will meet their needs. An analysis is also conducted to assess the feasibility of the development of the information system, and a software requirement specification document is created. The document will guide the developers in the entire process and can be reviewed by the CEO and prospective clients. The determination and documentation of the end user’s requirements mark the system analysis. After getting the users to need and identifying the project resources, we proceed to the system design phase. This phase defines the components, elements of the system, modules, security levels, and architecture. We also have to identify different interfaces as well as the types of data going through the system. We can ease the system design by doing it on a piece of paper to ascertain the outlook and functioning of the system. An expanded and detailed system design can then be produced as per the technical and functional requirements. The system is then implemented and deployed after drawing the system design. This phase follows after comprehending the system requirements and specifications. The actual code is written since the information system contains hardware
  • 5. (Kennedy, 2019). The implementation phase encompasses fine- tuning and configuration to ensure that the hardware meets the specified functions and requirements. The system is ready for installation and deployment in the company. After the installation and deployment, different subsystems and components are brought together to create an integrated system as a whole. The system is introduced to various inputs to acquire and analyze its behaviors, functions, and outputs. Testing is essential for ensuring that the client is satisfied. It can be pursued since it does not require any knowledge in design, hardware configuration, or coding (Lemke 2018). Testing will be performed by a team of specialized personnel in a systemic and automated way to allow the comparison of the actual outcomes with the desired or predicted results. Periodic maintenance of the system is done in the system maintenance phase. System maintenance entails continuous evaluation of the system's performance and replacement of old hardware. It is essential to also provide the latest updates for some components to ensure that the system complies with the latest technologies and the right standards to face the emerging security threats. Reference Cha, J., & Maytorena-Sanchez, E. (2019). Prioritizing project management competencies across the software project life cycle. International Journal of Managing Projects in Business. Harris, S. M. (2019). The Use of a Modified System
  • 6. Development Life Cycle (MSDLC) in a Sociological Environment to Improve Solution Validation (Doctoral dissertation, Morgan State University). Kennedy, K. (2019). Development of QR Code-based Data Sharing Web Application using System Development Life Cycle Method (Doctoral dissertation, Universitas Internasional Batam). Lemke, G. (2018). The Software Development Life Cycle and Its Application.