Forgot Password?
Mobile number is now mandatory for the security of your account.
We've sent you a verification code on your mobile number. Please enter it here to set a new password.
We've sent you a verification code on your mobile number or email address. Please enter it here to set a new password.
Differentiate between activity on node and activity on arrow for activity planning.
What is risk avoidance and risk mitigation.
For the following table of information
(a) Draw the network diagram
(b) List the network paths
(c) Determine the critical path(s)
(d) Determine the float for each activity
A software application "Student Attendance Automation and MonitoringSystem (SAMS)" aims at maintaining student attendance electronically. The system aims at capturing daily course wise attendance of the students. This application and generate a report of students having less than 75% attendance." Draw E-R diagram and data flow diagram for the above application determine the number of internal logical files, External inputs, External outputs, External inquiry types, External outputs and apply function point analysis (FPA).
Consider the cash-flows in rupees for four projects 'in Table below and compare the projects on basis of Net profit, pay back period, Net present value and return on investment Assume a discount rate of 10%
With the help of an example explain in detail the contents of a project closure analysis report and how it can be leveraged to improve the quality of future projects?
You are required to purchase best off-the-shelf payroll software for your organisation. What Quality criteria will you adopt and how will you evaluate the extent to which the candidate software packages meet the quality criteria.
Which methods are adopted to assess and visualize the progress of a project?
What is a resource histogram?
You are project manager for a major software company. You have been asked to lead a team that is developing next generation word processing software. Create a risk table for the project.
Explain with the help of an example how PERT techniques can be applied to evaluate risks to schedule.
A software application is to be developed for internal use by a software company which would include the following capabilities:
(i) Allow employees to register for company-sponsored recreational programmes like soccer, snowball and bowling.
(ii) Allow employees to register for company sponsored classes to help them manage their weight, reduce stress and manage other heath related issues.
(iii) Track data on employee involvement in these recreational and health management programmes.
(iv) Offer incentive to employees to join these activities and do well in them.
Develop a project scope statement for this project. Develop a detailed work breakdown structure for this project upto level 3.
Explain the detailed steps and different methods required to build a work break down structure (WBS). Explain why it is often so difficult to do? What do you understand by scope creep?
What do you understand by a project control cycle?
What is meant by estimation by analogy?
What is milestone analysis ?
What is extreme programming?
Define the following terms: -
i) Earned value
(ii) Cost variance
(iii) Schedule variance
(iv)Cost performance index
(v) Schedule performance index
Congratulations! Your trial of
is now active.
Let's catch up on a Zoom call and I'll help you craft a killer career plan! Bring your own coffee.
Sourabh Bajaj