SlideShare a Scribd company logo
Week Four Journal
Objective
You will identify key ethical problems facing the company,
create potential solutions to those problems, and explain why
certain solutions are better than others.
Instructions
In this assignment, you will identify problems that face the two
companies that you have chosen to study in this course. You
will explain those problems, how they affect the company, and
who or what is responsible for those problems. Then, you will
attempt to provide solutions to those problems, also identifying
the difficulties in implementing those solutions.
Please answer all questions in detail. Because this journal is
worth 5% of your final grade, there is a high expectation for
your participation. Grades for the journals are based on content,
critical engagement, quality of reflection, and detail. Please
submit the completed journal via the Assignment Basket found
in the Week Four Journal tab on the left navigation toolbar by
Day 7.
Problems Facing Not-for-Profit Company
1. Identify two to five problems that face your chosen not-for-
profit company. Explain those problems.
a. Why do these problems exist? Present the background on
these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here, you can
feel free to brainstorm and merely list various solutions to the
problems that you identify.
3. Choose a best solution for each problem. Explain why that
solution is the best solution. In addition, determine whether or
not the solution is possible and what would need to be done to
implement the solution.
Important note: Do your best to support your claims with
evidence, facts, and information that you have learned about
ethical theories and values throughout the course.
Problems Facing For-Profit Company
1. Identify two to five problems that face your chosen not-for-
profit company. Explain those problems.
a. Why do these problems exist? Present the background on
these problems.
b. How do these problems impact the organization?
c. Who is responsible for these problems?
2. Identify potential solutions to those problems. Here you can
feel free to brainstorm and merely list various solutions to the
problems that you identify.
3. Choose a best solution for each problem. Explain why that
solution is the best solution. In addition, determine whether or
not the solution is possible and what would need to be done to
implement the solution.
Important note: Do your best to support your claims with
evidence, facts, and information that you have learned about
ethical theories and values throughout the course.
1
CLASS NAME: MIS600
PROFESSORS NAME: William Ying
STUDENTS NAME: Issah Musah, and Raj Patel
PROJECT NAME: NETWORK DESIGN
Content
Topic
Page No.
Cover Page
1
Content
2
Executive summary
3
Project Charter
3
Earn Value Statement
11
Executive Summary
Network under a set of confined region is known as Intranet. It
uses an IP protocol and IP-based tools like the file transfer
application and web browsers that is provided by the server to
only assigned IP address. Computer network communication is
an important installation in a contemporary organization
organisation. As the organization's service provision is
improved through the reliable communication, its competition
with related firms is enhanced and, therefore, valued
competence. Ultimate network design as a mode of flow of
information among employees and stakeholders in promotes
coordination in the management, team work and services the
business offer. This automatically improves the performance of
the organisation at the good will of all workers.
It should be noted that an organisation's communication systems
alone holds a large percentage in its performance that it should
not be compromised, even on the slightest default. This would
mean that the organisation would require an Information System
that when a default occurs at any single point in the connection
system, it would be easier to detect and reach that point as soon
as possible. The design should be design with backbone network
so temporally technical problem with not upset the performance
of network communication. This is more appropriate in big
organisations to maintain their data and communication
confidentiality, integrity and accessibility. In networking design
approach, the choice of device should be intelligently selected
for the desired function, this will enhance performance in terms
of managing security, traffic, errors in storage and transmitting
information.
Documents and programs that are sensitive are run through LAN
security domain system to create passwords for their protection
against cybercrimes. The protected file would then be accessed
by authorised personnel only. This would be an important idea
where security of flowing information is paramount. Each set of
the employee has got a privilege to prevent the access of any
restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Robert
Prioritization
To design network that will provide information and
communication confidentiality, integrity and accessibility
Owner(s)
Jacobs Adam
Start Date
11/09/15
Scheduled Completion Date
12/15/15
Mission/ Purpose
Based on customer’s statistical report, we are designing network
that will provide faster, with increased security assurance and
24/7 direct online support platform.
Project
Description and Project Product
It is assured to increase online communication and coordination
between sales services and customers.
Optimize the customer choice to online shopping.
Additional capacity with be added to the design to align the
company’s current market demand.
Rejuvenating company network infrastructure, plan and trend
through the network design. Incorporating additional features
and the new branches that are currently established.
Objectives
Increase sales through the utilizing the speed of the network.
use
Business NeedSince customers are the main financial sponsors
of the company, and by popular request, we intend to recreate
the website to meet the following criteria:· Mobile friendly·
Enhance information security
· Add new functionality
· Improve usability
· Keep up to date and shake things
Milestones
Network is expected to be mobile friendly i.e. with Wi-Fi
capabilities
By 11/30/15 midway of the project is evaluated according to
standard.
Last revision date by 12/07/15
Budget
Estimated Labor
$150000.00
Estimated Materials
$12000.00
Estimated Contractors
$20000.00
Estimated Equipment and Facilities
$21000.00
Estimated Travel
$8500.00
Total Estimated Cost
$211500.00
User Acceptance Criteria
User friendly and security assurance network structure is the
minimum success criteria as defined by the key stakeholders.
Contractors and customers will be in charge of testing and
evaluating the quality network and feedback will be collected
through employees and document report from contractors.
High-Level Project Assumptions
It is anticipated that similar project will be taken in about eight
years’ time, since vulnerability of network increase with time,
and technology will keep changing, preference will keep
changing based on factors like the economy, climate or
influence from our competitors market strategy. The network
design will create feasible working environment.
High-Level Project ConstraintsCreating perfect network
communication structure to suit both customer and business
needs.Providing fraud free network, customers are expect to
create online account with sensitive information such as social
security number, credit card and address. Project must be
completed on time to avoid exceeding budget.
Exclusions and Boundaries
Creating perfect network environment to suit both customer and
business needs.
Software interface is limited to be compatible to existing
hardware.
Project must be completed at most not more than a week after
stipulated deadline.
Budget must not increase more than 5% of the stipulated
budget.
Network technical support unit will be decentralized to
accommodate influx calls that will expected from employees
who may encounter technical problem. Feedback from users
should use during in the designing process.
Major Risks
Provide a written description of software process and hard
process.
Regular technical review to ensure that design meets standards.
Budget is expected to rise if design do not meet specification
and thee the need to fix flaws.
Experts are required to answer question about the tools used in
design.
Establishing a procedure for tracking and reviewing contractors
Documentation is required for all formal, informal procedure
and deliverables. Availability of testing tool.
KEY STAKEHOLDERS
Project Manager Authority Level
CEO: Robert Elson , (makes final financial decision of the
project)
Project Core Team
Author : Jacobs Adam
Owner/Sponsor: Robert Elson
Head of Contractors : Peter Christian
Manager : Joy Roberts
Subject Matter Experts (SMEs)
Programmers and software tester and equipment’s tools:·
Functionality testing· Usability testing· Interface testing·
Compatibility testing· Performance testing· Security testing
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
09/01/15
Customer/Sponsor Approval
Jacobs Adam
09/01/15
Earn Value Statement
Statement of Work—Project Description and
Project Product
The project intends to design easy to use network design that
will accommodate shareholder demand and leverage the
company on competitive edge against its rival.
Specification of the network is based on collective inquiry,
user’s feedback and sponsors request, and the priority is meet
the national regulation standard.
Scrum agile method approach will be employ in this design
development project, this will allow the product use by the
development team, while in design is in process, so that
feedback will be used to make correction on inherent and
apparent weakness that will be detected at the early stage..
The project team will be group in three, the developers, the
testers and the users. The user group will consist of
shareholders and designated team professional. Strong chain of
feedback mechanism will be establish between users and the
developers to report any fault at the early development stage.
However early glitch may also be detected at the testing level
and reported to the developers.
Project DeliverablesNetwork design will be will have about
500sqft Wi-Fi capability, encryption tool for the protection of
sensitive’s information of inputs made by client when hosting
on the network. Users will be authenticated. .
Project Objectives
The Objectives is to design company’s network to incorporate
additional features and also correct inherent apparent weakness
that have been reported on major cases by shareholders. It is
also intended to give competitive advantage over business
rivals. Project is schedule to complete in three commencing
from 09/09/15 to 12/15/15.
50% of the total budget will be disbursed for the comment of
the project and the remaining 50% will be disbursed at the
midway of the project. Provision of 5% increase of the original
budget is made available in the budget coffers to accommodate
anticipated increase project cost.
However, with the introduction of improved working tools,
project is expected to compete within budget.
Project Assumptions
Work space will be required to accommodate all working station
(i.e. developers, testers and users team station) and team
members.
Project is likely to take longer than will be expected since the
sponsors are part of the design process with direct influence on
the project, sponsors preference might keep changing.
In addition to the testers and the users who may report design
flaws ,experts or outsourced team may be required to
independently assess performance, evaluate and test network,
feedback may be employ to make to make required changes
when the need arise to extend service or employ feedback from
auditors to make any changes.
Other opportunities may be consider to affect design during
process if it will give competitive advantage over business
rivals.
Project ConstraintsOver security is concern like authentication
process may discourage and prolong access to network facility
.Project cascaded team and process may slow work. Project
design needs dedicated and reliable server, free from threat and
can host all team members time. Daily project routine needs to
be documented and review by head of project before going to
the next step, the procedure sometimes slow down development
process. Team are expected to have long meeting with legal
advisor before of the work begins.
Exclusions
Based on available spaces and tools, only 8 members are
required to the task.
Acceptance Criteria The network must operational or
compatible to the major internet devices protocols.
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
11/9/15
Customer or Sponsor Approval
Jacobs Adam
11/9/15
Week Four JournalObjectiveYou will identify key ethical proble.docx

More Related Content

Similar to Week Four JournalObjectiveYou will identify key ethical proble.docx

QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
eAuditor Audits & Inspections
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
Rikki Wright
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
bradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
deanmtaylor1545
 
1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx
felicidaddinwoodie
 
Trying to implement enterprise collaboration
Trying to implement enterprise collaborationTrying to implement enterprise collaboration
Trying to implement enterprise collaboration
Stephane Cheikh
 
Dual-Track Agile at Scale
Dual-Track Agile at ScaleDual-Track Agile at Scale
Dual-Track Agile at Scale
Soumeya Benghanem
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
doylymaura
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
TakishaPeck109
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
mariuse18nolet
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructions
bestwriter
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
nettletondevon
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
bobbywlane695641
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
rhetttrevannion
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 
Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docx
galerussel59292
 
Open Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier BankOpen Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier BankWSO2
 
1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 Busines1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 Busines
EttaBenton28
 

Similar to Week Four JournalObjectiveYou will identify key ethical proble.docx (20)

QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
Online cinematicketingdocx
Online cinematicketingdocxOnline cinematicketingdocx
Online cinematicketingdocx
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx1Running Head Business ProjectSection 1 Business Requirement.docx
1Running Head Business ProjectSection 1 Business Requirement.docx
 
Trying to implement enterprise collaboration
Trying to implement enterprise collaborationTrying to implement enterprise collaboration
Trying to implement enterprise collaboration
 
Web Engineering
Web EngineeringWeb Engineering
Web Engineering
 
Dual-Track Agile at Scale
Dual-Track Agile at ScaleDual-Track Agile at Scale
Dual-Track Agile at Scale
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructions
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
ACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docxACS Code of Professional Conduct Case Studies .docx
ACS Code of Professional Conduct Case Studies .docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 
Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docx
 
Open Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier BankOpen Source adoption in a Mexicon Second tier Bank
Open Source adoption in a Mexicon Second tier Bank
 
1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 Busines1Grand Canyon UniversityInstructor Name MIS-652 Busines
1Grand Canyon UniversityInstructor Name MIS-652 Busines
 

More from alanfhall8953

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docx
alanfhall8953
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docx
alanfhall8953
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docx
alanfhall8953
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
alanfhall8953
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
alanfhall8953
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
alanfhall8953
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
alanfhall8953
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docx
alanfhall8953
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
alanfhall8953
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
alanfhall8953
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
alanfhall8953
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docx
alanfhall8953
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docx
alanfhall8953
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docx
alanfhall8953
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docx
alanfhall8953
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
alanfhall8953
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docx
alanfhall8953
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
alanfhall8953
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docx
alanfhall8953
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docx
alanfhall8953
 

More from alanfhall8953 (20)

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docx
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docx
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docx
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docx
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docx
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docx
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docx
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docx
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docx
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docx
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docx
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Week Four JournalObjectiveYou will identify key ethical proble.docx

  • 1. Week Four Journal Objective You will identify key ethical problems facing the company, create potential solutions to those problems, and explain why certain solutions are better than others. Instructions In this assignment, you will identify problems that face the two companies that you have chosen to study in this course. You will explain those problems, how they affect the company, and who or what is responsible for those problems. Then, you will attempt to provide solutions to those problems, also identifying the difficulties in implementing those solutions. Please answer all questions in detail. Because this journal is worth 5% of your final grade, there is a high expectation for your participation. Grades for the journals are based on content, critical engagement, quality of reflection, and detail. Please submit the completed journal via the Assignment Basket found in the Week Four Journal tab on the left navigation toolbar by Day 7. Problems Facing Not-for-Profit Company 1. Identify two to five problems that face your chosen not-for- profit company. Explain those problems. a. Why do these problems exist? Present the background on these problems. b. How do these problems impact the organization? c. Who is responsible for these problems? 2. Identify potential solutions to those problems. Here, you can
  • 2. feel free to brainstorm and merely list various solutions to the problems that you identify. 3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution. Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course. Problems Facing For-Profit Company 1. Identify two to five problems that face your chosen not-for- profit company. Explain those problems. a. Why do these problems exist? Present the background on these problems. b. How do these problems impact the organization? c. Who is responsible for these problems? 2. Identify potential solutions to those problems. Here you can feel free to brainstorm and merely list various solutions to the problems that you identify. 3. Choose a best solution for each problem. Explain why that solution is the best solution. In addition, determine whether or not the solution is possible and what would need to be done to implement the solution. Important note: Do your best to support your claims with evidence, facts, and information that you have learned about ethical theories and values throughout the course.
  • 3. 1 CLASS NAME: MIS600 PROFESSORS NAME: William Ying STUDENTS NAME: Issah Musah, and Raj Patel PROJECT NAME: NETWORK DESIGN Content Topic Page No. Cover Page 1 Content 2 Executive summary 3 Project Charter 3 Earn Value Statement 11
  • 4. Executive Summary Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers. It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information. Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed
  • 5. by authorised personnel only. This would be an important idea where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company. Project Charter Project Name Network Design Project Number DW2 Project Team Sponsor: Robert Elson Author : Jacobs Adam Manager: Joyce Robert Prioritization To design network that will provide information and communication confidentiality, integrity and accessibility Owner(s) Jacobs Adam Start Date 11/09/15 Scheduled Completion Date 12/15/15 Mission/ Purpose Based on customer’s statistical report, we are designing network that will provide faster, with increased security assurance and 24/7 direct online support platform.
  • 6. Project Description and Project Product It is assured to increase online communication and coordination between sales services and customers. Optimize the customer choice to online shopping. Additional capacity with be added to the design to align the company’s current market demand. Rejuvenating company network infrastructure, plan and trend through the network design. Incorporating additional features and the new branches that are currently established. Objectives Increase sales through the utilizing the speed of the network. use Business NeedSince customers are the main financial sponsors of the company, and by popular request, we intend to recreate the website to meet the following criteria:· Mobile friendly· Enhance information security · Add new functionality · Improve usability · Keep up to date and shake things Milestones Network is expected to be mobile friendly i.e. with Wi-Fi capabilities By 11/30/15 midway of the project is evaluated according to standard. Last revision date by 12/07/15 Budget Estimated Labor $150000.00
  • 7. Estimated Materials $12000.00 Estimated Contractors $20000.00 Estimated Equipment and Facilities $21000.00 Estimated Travel $8500.00 Total Estimated Cost $211500.00 User Acceptance Criteria User friendly and security assurance network structure is the minimum success criteria as defined by the key stakeholders. Contractors and customers will be in charge of testing and evaluating the quality network and feedback will be collected through employees and document report from contractors. High-Level Project Assumptions It is anticipated that similar project will be taken in about eight years’ time, since vulnerability of network increase with time, and technology will keep changing, preference will keep changing based on factors like the economy, climate or influence from our competitors market strategy. The network design will create feasible working environment. High-Level Project ConstraintsCreating perfect network communication structure to suit both customer and business needs.Providing fraud free network, customers are expect to create online account with sensitive information such as social security number, credit card and address. Project must be
  • 8. completed on time to avoid exceeding budget. Exclusions and Boundaries Creating perfect network environment to suit both customer and business needs. Software interface is limited to be compatible to existing hardware. Project must be completed at most not more than a week after stipulated deadline. Budget must not increase more than 5% of the stipulated budget. Network technical support unit will be decentralized to accommodate influx calls that will expected from employees who may encounter technical problem. Feedback from users should use during in the designing process. Major Risks Provide a written description of software process and hard process. Regular technical review to ensure that design meets standards. Budget is expected to rise if design do not meet specification and thee the need to fix flaws. Experts are required to answer question about the tools used in design. Establishing a procedure for tracking and reviewing contractors Documentation is required for all formal, informal procedure and deliverables. Availability of testing tool. KEY STAKEHOLDERS Project Manager Authority Level CEO: Robert Elson , (makes final financial decision of the project)
  • 9. Project Core Team Author : Jacobs Adam Owner/Sponsor: Robert Elson Head of Contractors : Peter Christian Manager : Joy Roberts Subject Matter Experts (SMEs) Programmers and software tester and equipment’s tools:· Functionality testing· Usability testing· Interface testing· Compatibility testing· Performance testing· Security testing APPROVALSType NameSignatureDate Project Manager Approval Robert Elson 09/01/15 Customer/Sponsor Approval Jacobs Adam 09/01/15
  • 10. Earn Value Statement Statement of Work—Project Description and Project Product The project intends to design easy to use network design that will accommodate shareholder demand and leverage the company on competitive edge against its rival. Specification of the network is based on collective inquiry, user’s feedback and sponsors request, and the priority is meet the national regulation standard. Scrum agile method approach will be employ in this design development project, this will allow the product use by the development team, while in design is in process, so that feedback will be used to make correction on inherent and apparent weakness that will be detected at the early stage.. The project team will be group in three, the developers, the testers and the users. The user group will consist of shareholders and designated team professional. Strong chain of feedback mechanism will be establish between users and the developers to report any fault at the early development stage. However early glitch may also be detected at the testing level and reported to the developers.
  • 11. Project DeliverablesNetwork design will be will have about 500sqft Wi-Fi capability, encryption tool for the protection of sensitive’s information of inputs made by client when hosting on the network. Users will be authenticated. . Project Objectives The Objectives is to design company’s network to incorporate additional features and also correct inherent apparent weakness that have been reported on major cases by shareholders. It is also intended to give competitive advantage over business rivals. Project is schedule to complete in three commencing from 09/09/15 to 12/15/15. 50% of the total budget will be disbursed for the comment of the project and the remaining 50% will be disbursed at the midway of the project. Provision of 5% increase of the original budget is made available in the budget coffers to accommodate anticipated increase project cost. However, with the introduction of improved working tools, project is expected to compete within budget. Project Assumptions Work space will be required to accommodate all working station (i.e. developers, testers and users team station) and team members. Project is likely to take longer than will be expected since the sponsors are part of the design process with direct influence on the project, sponsors preference might keep changing. In addition to the testers and the users who may report design flaws ,experts or outsourced team may be required to independently assess performance, evaluate and test network, feedback may be employ to make to make required changes when the need arise to extend service or employ feedback from auditors to make any changes. Other opportunities may be consider to affect design during
  • 12. process if it will give competitive advantage over business rivals. Project ConstraintsOver security is concern like authentication process may discourage and prolong access to network facility .Project cascaded team and process may slow work. Project design needs dedicated and reliable server, free from threat and can host all team members time. Daily project routine needs to be documented and review by head of project before going to the next step, the procedure sometimes slow down development process. Team are expected to have long meeting with legal advisor before of the work begins. Exclusions Based on available spaces and tools, only 8 members are required to the task. Acceptance Criteria The network must operational or compatible to the major internet devices protocols. APPROVALSType NameSignatureDate Project Manager Approval Robert Elson 11/9/15 Customer or Sponsor Approval Jacobs Adam 11/9/15