Project Management for Computer Upgrade Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

IT Project Management

PROJECT CHARTER

Objective of this project is to upgrade the new computer system for the ACME Incorporation. The company has decided to launch the 200 desktop computers to enhance organization efficiencies. The company will also take the advantage of the new system to integrated effective security systems, which will include:

Account lockout policy (SANS CSC 16-9),

Password policy (SANS CSC 16-8), and Screen Lock Policy (SANS CSC 16-6).

Integrated of effective security system will enhance efficiencies of all employees across all departments within the organization. The estimated costs to complete the project are $300,000, which will cover the computer upgrade and integration of the security systems. The time frame to complete the project will be 3 months, and the project team will consist of the Vice President of IT department, the project manager, and project team members. The standard required for the project is that the new system should be able to enhance efficiency of all ACME departments. Moreover, the new system should be able to save costs of the company business operations. Moreover, the new project should be able to enhance the IT security against internal and external threats.

However, the project is subjected to the following risks and constraints:

Inflation may increase the cost of materials used to complete the project.

Communication breakdown,

Incomplete design.

Inaccurate cost estimates.

Outsourcing delays

Inaccurate time-frame to complete the project.

Authorized by CME vice IT President John Wall Date: 30 March, 2014

?]X?[?X??]H????
H]H??]?[ ?H?X??]H??[H?[[??YHX???[?????]?X?H
?S????? M?NJK?????X?H
?S????? M?N
K[???Y[?????X?H
?S????? M?M?K???X??X?[?X????[???K?H??X??[?H?Y?Y?XZ?H??????X?Y??X?Y?X?????][?H?[H??????????X?]?H?Y[? ?????[?[??????[?]Z?H[??[[????[?[???]]?X]X?[K????H??X??[[?Y?]HH]H?X???X?]?H????[????[?H?YZ??X??X?[[???[?Y???[Y[??[?[??H??[?[???[??[?????[?????][????K???[??H[??Z[????[K??[?]H??[[?????P?QHX?Y???YH]???]???[H[?[?Y?]HH?X??]H??[H???X?]???[??X?]?H?H[??Z[??????????X]Y?H??[??HU??[K?[?H??[??H??[???[????Y[? [?Y?]Y?]???]???[????H?X?X[?[?[??H??]]]?HX??]Y?[?Y????[?[???[????]]Y??[H?[?XZ?H??[?^?][????HX??]Y?[?Y???X?]?H?H[?X?[]H????Y??X?]?[H????Y????Y[X[? ?[?[????[?^?][???H?X?[????[?????X]?[?H??[??HU[????Y[? ?H?X]??H[??Y[???X?[??]?[??H??[?^?][?[[???X][???[??X]??[????H[???X][???[???Y?[?Y?X?][?[?[?X[???[?H?]X?[???X??X?[KP?QH[???X][???[H??[?HH?[?X[???[??H??X]?Y?H[???X][???[??H????X?Y ???[?????H???[????[??][?HU[????Y[? P?QH?[?YH]??????]???[??H]??????[???]???Y[???H??????[??Y??P?QH?[[??[?Y?]H?X??]H??[H???X?]??????]???[HY?Z[????[???[[?^??[?X]?[?Y?][???]???]?[??X??]H??[H?[???P?QH?[???HH????[????[?]Y???P?QH?[?HX?H?X?Y]?H??]]]?HX??]Y?[?Y???]?]???[H?X?]?HH??[?H?[?HX?H????]ZX??H?HX??][X[? ???[?[??H??[?H?[[?[??H]?[?YYI??Y??X?Y[??H?]H?]???[K?X??[???P?QH?[???HX??]Y?[?Y????H?]???[H?[???H??[?H?[??X?H]??[??]?????H?]???[H?[[?????P?QH???X?]???[?Y?Z[????[???[[?^??[[??Y???????P????B??[?[???H??[?P?QH[???X][???[??HH??[?H?X?H??Y[??]?X[?]H??[??YY??H?YY?]H]?[???X][???[?H?X?H??Y[?[???[???Z??HY?[?Y???[?Y?]H??[?X[?X??]H??[?[??H?]???[?H?]???[??[????? ? ????]?[?H?YYX????H?YH[???[??[???[?]?X???[?[??X??][???[?[?H??[?H?[[[Y[?H?YH?]X?[?X??]H?????[??H?]???[??? ?N???[?[???X?]???H??[?H??X??????????[??HH??[?H??]???[H[?[??X?HH?[H?]??????[?Y?]HH?]???[H[????[??H??[???Y??]?X?[???H
H?HH[??H???[YX?????]?[?H??[H]?[???H??[?H??X??[?[? ]?Y[???[???????????X??]????H L K???[?[??H???[?[YH?]?[?????[??[?????????X??[???]Y[?HX?[?HH??[??????][???? ????][Y[??????H???H?H???[???X????YHH??[?H?]]Y??]???[H[??X?H?]H?]???]???[H?[?[??HY??X?Y[??H???[?Y[???][?H??[?^?][??HX??[??H?]?XH?H]H??X??[[?[??H????]?[????[?[?[??[????[?[H?]???H?X?H??Y[??HU?[?HH??X? ??????[?H??[?[?[???[?H??[X][H ? ?H??X??][??[?H ?[????[?????HX^H K ? M[???]Y?H]Y??K ? M ?H??X?X[?Y????[?H??X?X[HY[X????[[[Y[???]??YH??HP?QH[?????[[X?H?H?][Y[????????[?Y?[?????Y[?[?????????[YB??]HYK??]Y[??B??[???X][?X?????B??U?Y[???HX^H ? M L?X^H ? M??X??][???X??][???Y[???H?[?H ? M L??[?H ? M???[???[??Y[???H?[H ? M L??[H ? M?? ????[?^?][?[[X???H??X??[[]??H????[??[X??H??[?^?][??????[?^?][???[X??H?X?][????[?^?][???P?QH[????][???H[X??H??X??H??[?^?][?????[??X?H?[??]????H
K????[??X?HHY??X?Y[??H?[?YY?X????[?Y[? ?????YX?H???????][?X????H?Y[?????[??H???Y??]?X?[???? ????X?[]??X???Z[??B??[]??X???K?[?]X][??H??X?Y?[?][???Y?[?[????[?X?[][???H??]???[B??Y?[?[????[?X??]H??[H??H??[K????[X][??H??X????????[X][??H??X??][??????H?YY???HX??X?[?? ?????[?]X][???X??]H??[H??H??X? ???Y?[?[????[X???[?????]?X?H
?S????? M?NJH?X?Y?X?][???Y?[?[????[?????X?H
?S????? M?N
K[?Y?[?[????[??Y[?????X?H
?S????? M?M?K??????X?^X?][???[??[][??H?]???]???[K???[?Y?][???H?X??]H??[H???X?H??]???[???????[?????X???Y?Y?YY]??[?Z?Z?????YY??? ?N?[]??X???]????B??H????[???H?] [????H[]??X??][??YN????[H?ZY??????[?[]K[?X?][???? ?????X? ???[X]Y???? ?[??][???HP?QHX[?Y?[Y[??[]]?^?H??[X][H ? ??H??X?[?H??X??][??[?H??[X][H ?[??H?????[???H?????]???]???[H[????H[?????H??H?X??]H??[K?H?[??[???H???H? ? ?????]??[???[????[??H?Y??H????[?[??[][??????X?Z[??B??]H?[X]Y??[]??X?J?H[??YY?????Y[??H]?[????]?[??[??H ?[??]Z?[Y[???^H H?^H ?????[??[??H ?[??]Z?[Y[???YY][B??X??X?[????^H
?^H
??????Y???]Z?[Y[?[?X??X?[???YY???Y?????][??????^H?^H L???????Y???]Z?[Y[?[???]????YY???Y???X???[?????]?X?H
?S????? M?NJH?X?Y?X?][???^H M?^H NB?????X???[?????]?X?H?]Z?[Y[????Y????????X?H
?S????? M?N
K??^H ??^H ???????????X?H?]Z?[Y[????Y?????Y[?????X?H
?S????? M?M?K???^H ?H?^H ????????Y[?????]?X?H?]Z?[Y[????Y???N???P???US?????X?[???Y?H??X???[[??]?[Y??X?H??X?Y?X?X??H?X?[?[????Y?H????[?????Z[??]?[Y??X?H??X? ?H?[????Y?H??[?^?][?[X[H??[?^?][?[[?[?????X?[]Y??XX???X?X[K???K?N???X???[[???H??X???[[???HP?QH??X??[?H????????H?[X]Y?Y?]? ? ?[?H?Y??X?Y[????]HH??X? ???H??????[??Y?????]HH??X??HY]X]K???H[?X?]Y?[???????X[?????[YY]HZY????X??]Z?[Y[???????X???[?]X^H??[]HH??X???????H?[X]H?][????]HH??X???Y??X?Y[? ???H?HX[?Y???[???H?X]?X[???]HH??X?Y???X?Y?X?][?[???Y?X?][??HUX[K???K?????X???Y???[?]H?]?XN???O?Y? ?[?]K??]X?[ ]??YN??]Z??[[YYX]H????][????][?????? KH?YY][K?[?]H??YN??]Z??????]?Y??H??][???^??X?Z[??K????? KH????[?]H??YN???H????Y?[????X???][???
??X?H???X?X[?Y?[Y[?  ?
?
JK???????Y??YK??????X???Y???[?]B?????????[????]?[????][???X?? ? ? M??????H???[???[H????YY]H[?X?]Y??[????????????YH]???]???[H]?[[?[??H??[?^?][?[??[??????????X?? ? ? M?????????[??X??]H??[H???Y]X]H???X???]???[K????[?Y?]HH??[?X??]H??[H??H??X?[????]???[K???X?? ?K ? M????????X][??H??X???[[Y[[?B???X][??[???[[Y[[?H?HX?? ?K ? M??H??Y?HHY[X???[?HX[HXY????K????X??????HX?H?[????Y???[????]X^HY??X?H??X? ?HX?H[???]?X[?HZ]Y?][?[??X[?Y?HH??????????XB??Z?[Z???? K
B????????????X?[X???Z]Y?][?[???B??[??][???B???X?H??Y[??U????X?[^H[???[]H??X? ???????????X[?Y?[Y[?[????????[][?X?][???XZ???????XY[???H??X?Y?X? ???Y??X?]?H??X???[][?X?][?[??????[???[?H?[?[?X[?Y?[Y[??[?]K???????X?H??Y[??U????X?[^H??[??[??H[???X? ??????????[???X[?Y?[Y[?[?????????[?????????????X?H??Y[??U????X?Y?X?X^HXY??X? ???Z?X? ?????[???X[?Y?[Y[?[???B?????Y???Z[?[???B??[X[??????H?X??????X?Y?X? ???[X[???????[??????[???]H?Y??????X?H??Y[??U????X?Y?X?[???]X[]H??X? ??????HX[?Y?[Y[?[??????X???[???B???X?H??Y[??U???????[][?[?[?[Y[H??X?[]??K?????[???[???????[????]X?[?Y???[??H??X?[[Y[?][????B??[X[????????X????[?X?H???]H?^H?]X?[? ???[X[??????H[???B??[?X???]H????[X]??B???X?H??Y[??U???[??H[???X??Y?]?????X[?Y?[Y[?[???L???]????[??[^??B??????[Y[??X??????X???][?[^B??????[Y[?X[?Y?[Y[?[???K????X?????Z[???H????[????X?????Z[???HY[?Y?YY????Y?] HH?Y?]?[Z]Y? ? ??H?YH? ? ????[?[?Y?][??H?X??]H??[????????? KHH LY[X????[?H?]Z?Y?[[Y[?H??X? ?X?[??YH???X[?[?[?[??H?Y????????H??X??Y[?Y?YY[?[?[^?YH????????X]Y?H??X? ??????N?H??X????YH ? ?????[?[?Y?][??Y??X?]?H?X??]H??[H??H??X?[????]???[K?????Y[N?H??X????Y[H???]H?][? ?[[???[?????HX^H K ? M[?[?]Y??K ? M ?
[?^ H[? ??]?X[H??X?[YH[?H[??]???XY?[JK???????X???X??H??X???H?X?????H??X??[Y??H??X?X[?Y???H??X?X[?Y???[??X?H?YZ?HYY][???]??[??X?X[HY[X???[?[??HH??X? ???X????[?[??H??X?X[?Y???[X[?Y?HH??X??H[Y?][??H????[???Y?[??H??X?]Y????[??X?X[K?[?H[?[?KH??X?X[?Y???[??[][?X?]HH??X? ????????H??X??Z?Z?????Y?[XZ[ ????[??H?[?[?????????X?X[H??[?^?][?[??
??X?H???X?X[?Y?[Y[?  ?
?
M?K?????X?X[H??????X?X[HY[X????????X?[]Y???X?HU?X????????[??H?H??X?????[????YH]HX[?Y?[Y[????H??X? ?H[??????[?H??X??Y?[???X?[[Y[?][??????X?X[?Y????[[?]???[[?X[?Y??H[??H??X?[?[??????[?X?????H??X? ?H??X?X[?Y???????X?H???HH??X?[?[??[X????X]HX[HY[X????H??X? ?H??X?X[?Y??[???????H[??H??X?X[H?[???H]XX???X?X[H??Y??]H??X??]Z?[Y[??
??X?H???X?X[?Y?[Y[?  ?
?K????X?]?B????????[?????????????????X?H??X??YY][???[??X??H??[][?X?][?XYH?H??[??X?X[HY[X???????X?X[HY[X?????[YH?]???]?????HU?Y[?[?H??X??Y??[???H]H??X??????Y?????????X?X[HY[X?????[Y???????[Y???????X?H??H??[?X?Z][??[??Z[?[???[X[?????????H?Y??H??X?[[Y[?][??????X?X[HY[X?????^Y[?[^??[^?[?H????X?H??H????[Y[??[X]?X[???H??X? ?[^?[?H????X?H?????H[????[???[X]?X[???H??]??X??]K?????X?X[HY[X????XY??Z??B??XY???[?U?X?X[????[??[?H??X??Y?[?[[Y[?][??????X?X[HY[X??????^H??[?????^H?[?U?X?X[????[??[?H??X??Y?[?[[Y[?][??????X?X[HY[X?????[???Y???[???[?U?X?X[????[??[?H??X??Y?[?[[Y[?][??????X?X[HY[X????[?????X[???[????[??[?U?X?X[????[??[?H??X??Y?[?[[Y[?][???????P??Q?T?S??T??Z[??B??[]??X?B????X?H???X?X[?Y?[Y[?
?
?K?????X???[][?X?][?[???????X?H???X?X[?Y?[Y[??????[??[Y[? ?T?K?????X???[????Y?N???[[?]?????X?X[?Y????f?6R?B&W6?FV?B????v??2FFS?3?&6??#@???&??V7B7??6? ??V?F?6W0??V?F???&??V7BF??R??P??V?F??#??WGv?&?F?w&[continue]

Cite This Term Paper:

"Project Management For Computer Upgrade" (2014, March 30) Retrieved December 9, 2016, from http://www.paperdue.com/essay/project-management-for-computer-upgrade-186355

"Project Management For Computer Upgrade" 30 March 2014. Web.9 December. 2016. <http://www.paperdue.com/essay/project-management-for-computer-upgrade-186355>

"Project Management For Computer Upgrade", 30 March 2014, Accessed.9 December. 2016, http://www.paperdue.com/essay/project-management-for-computer-upgrade-186355

Other Documents Pertaining To This Topic

  • Request for Project Management Plan

    Monroenico Hospitality Company Project Purpose and Description The purpose of this project is as follows: The complex interplay of collaborative effort which every major information technology (IT) project requires a precise system of measurement through which to quantify and qualify the occurrence of success or failure, and this process is best performed with a practical system of project metrics. Traditional project metrics such as customer satisfaction rating and return on investment have

  • Computer Security Corporate Security Documentation Suitable for

    Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

  • Project Management Life Cycle

    software deployment life cycle after discussing the first of the phases of this important life cycle. Phase IV is seen as a crucial phase wherein is dealt with the actual performance of the newly installed software. Phase V concludes the life cycle and provides impetus for any new deployment plan in future. The Last Two Phases of the Software Deployment Life Cycle Software deployment is a complex endeavor, most fittingly used

  • Computer Security People Process and Technology Are

    Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

  • Managing the Hidden Costs of Information Technology

    Managing the Hidden Costs of Information Technology Information technology is an increasingly critical aspect of organizational functioning, thus most organizations can not afford to operate without it. There are many costs, direct and hidden however that result from information technology. It is critical to understand and learn how to manage those costs for organizations to succeed. Most of the direct costs associated with information technology include the obvious: acquisition of

  • Management and Decision Sciences From

    76). As automation increasingly assumes the more mundane and routine aspects of work of all types, Drucker was visionary in his assessment of how decisions would be made in the years to come. "In the future," said Drucker, "it was possible that all employment would be managerial in nature, and we would then have progressed from a society of labor to a society of management" (Witzel, p. 76). The

  • It Infrastructure Project Description the

    Secured real time protocol (SRTP) is also being identified to enhance the security parameter of WAN and LAN network elements. "SRTP provides protection with encryption keys for wired and wireless networks including bandwidth limited channels." (Guillen and Chacon 2009 P. 690). There is also a growing use of IP secure to protect organization from the interception of data over the LAN and WAN environment. To enhance network security, Chen, Horng,


Read Full Term Paper
Copyright 2016 . All Rights Reserved