answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
1 year ago
5

Why is project scope management so challenging in IT projects? What suggestions do you have for preventing scope creep in projec

ts? What did you think about the approach Northwest Airlines used for improving user input and reducing scope changes on their reservation system project?
Computers and Technology
1 answer:
seropon [69]1 year ago
6 0

Answer:

Explanation:

<u>Ways to Avoid Scope Creep</u>

Scope creep is what happens when changes are made to the scope of a project without any control. Changes happen to projects all the time without been notify ontime as a project manager. It is that very rare project that ends up delivering exactly what was asked for on the first day. However, without there being some control over the changes, a project manager has little chance of keeping on top of the work and managing the project effectively.

Generally, scope creep is when new requirements are added after the project has commence. These changes are not properly reviewed. The project team is expected to deliver them with the same resources and in the same time as the original scope.

On the other hand, as a project manager you could end up with a project with lots of approved, considered changes, that never ends because every time you think you have finished a new requirement arrives in your inbox and you have to make more changes.

The following are five ways to keep control of your project.

<em>1-Document the Requirements</em>

<em>2-Set up Change Control Processes</em>

<em>3-Create a Clear Project Schedule</em>

<em>4-Verify the Scope with the Stakeholders</em>

<em>5-Engage the Project Team</em>

You might be interested in
Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve
miv72 [106K]

Answer:

The cpp program to print US presidential years is given.

#include <iostream>

using namespace std;

int main()

{

   // variable to hold presidential election year declared  

   int elec_year;

// variable to hold presidential election year initialized to 1792  

elec_year=1792;

   

// the value displayed on the console output

   std::cout << "The U.S. presidential election years from 1792 to present day are listed. " << std::endl;

   

   // loop executes till year is less than or equals 2020

   do

   {

       // initial value is printed

       std::cout << elec_year << std::endl;

       

       // value is incremented by 4

       elec_year = elec_year + 4;

       

   }while(elec_year<=2020);

   return 0;

}

OUTPUT

The U.S. presidential election years from 1792 to present day are listed.  

1792

1796

1800

1804

1808

1812

1816

1820

1824

1828

1832

1836

1840

1844

1848

1852

1856

1860

1864

1868

1872

1876

1880

1884

1888

1892

1896

1900

1904

1908

1912

1916

1920

1924

1928

1932

1936

1940

1944

1948

1952

1956

1960

1964

1968

1972

1976

1980

1984

1988

1992

1996

2000

2004

2008

2012

2016

2020

Explanation:

The program works as described.

1. An integer variable, elec_year, is declared and initialized with the first US presidential year value, 1792.

2. Inside the do-while loop, the variable, elec_year, is first printed to the console followed by a new line inserted using, endl.

3. The variable, elec_year, is then incremented by 4.

4. The do-while loop continues till the value of the variable, elec_year, does not exceeds the current year, 2020.

5. The program ends with a return statement since main() has return type int.

6. Only one variable is used in the program.

7. The program consists of only main() method since cpp is not completely object oriented programming language.

8. The same program, if written in object oriented programming language like java or c# will be written inside a class and executed through main() method.

4 0
1 year ago
A search box does all of the following EXCEPT ________.
Rudik [331]
The answer is the first one
6 0
2 years ago
Read 2 more answers
A company requires an Ethernet connection from the north end of its office building to the south end. The distance between conne
BlackZzzverrR [31]

Answer:

A company requires an Ethernet connection from the north end of its office building to the south end. The distance between connections is 161 meters and will need to provide speeds of up to 10 Gbps in full duplex mode. Which of the following cable combinations will meet these requirements?

ANSWER: Use multi-mode fiber optic cable

Explanation:

MULTI-MODE FIBER OPTIC CABLE

For Ethernet distances up to 100 meters, the Copper CATX cable will do just fine. In the question, we are dealing with a distance of up to 161 meters, so we need an Ethernet extension. LAN extension over fiber optic cable with media converter can be used to convert the Ethernet cable runs from copper to fiber. Multi-mode fiber has a range of 550 meters for 10/100/1000 Ethernet links.

Multi-mode optical fiber is commonly used for communication over short distances, like within a building or on a campus. They are capable of data rate of up to 100 Gbps, which surpasses the requirements in this question. They are more economical in this case as they are not as expensive a the single-mode optical fiber cable. Fiber optic cable has the advantage of being immune to electromagnetic interferences, spikes, ground loops, and surges. This makes it more suited for this purpose.

7 0
2 years ago
____ is a program placed on a computer without the user's knowledge that secretly collects information about the user
Scrat [10]
<span>Spyware is a program placed on a computer without the user's knowledge that secretly collects information about the user.
</span><span>The spyware gathers information and can send this information to another program or entity which can take control over the device or use personal information to harm the user. </span>
7 0
2 years ago
bill and melinda have two young children ages 2 and 4 and they are not covered under any life insurance policy. Melinda is full
Jet001 [13]
Melinda and Bill should brainstorm to think of ways on how to have another additional income. In the case of Melinda, she could start a small business or any ways in which she could earn at home. Also, they could track down their expenses and find ways to cut down expenses to have some spare money to start paying for a life insurance policy. 
4 0
1 year ago
Other questions:
  • PLEASE HELP!! WILL GIVE BRAINLIEST!!
    15·2 answers
  • On the Picture Tools Layout tab, you can preview results of the numerous styles, borders, effects, and layouts by _______ comman
    7·2 answers
  • The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by ele
    7·1 answer
  • The blue bar across the top of the screen informs you of the Screen Title, or what step you are on.
    5·1 answer
  • Which would be the most efficient way to store files on your computer?
    13·2 answers
  • Budget Analysis (use while loop) Write a program that asks the user to enter the amount that he or she has budgeted for a month.
    5·1 answer
  • 7.8.1: Function pass by reference: Transforming coordinates. Define a function CoordTransform() that transforms the function's f
    6·1 answer
  • int decode2(int x, int y, int z); is compiled into 32bit x86 assembly code. The body of the code is as follows: NOTE: x at %ebp+
    5·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • A large organization is struggling to close the gaps in skill levels that exist between its employees and those from competing c
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!