Define a WBS to describe the deliverables expected for Compute.Access.SeeLock. To normalize the work done, your WBS will be created using the following guidelines: 1. High Level deliverables should be Hardware, Software and Procedures 2. There should be three levels in the WBS (note not all deliverables may need three levels) 3.The number of work packages should be between 10 and 15

Information Technology Project Management
9th Edition
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Kathy Schwalbe
Chapter5: Project Scope Management
Section: Chapter Questions
Problem 5E
icon
Related questions
Question

Review the project charter below for a brief description of project Compute.Access.SeeLock and answer the questions presented after. (This is a non-graded assignment)

CHARTER BEGINS.....

Version 1.0
Distribution: Restricted to Sponsor and Project Team
The SeeLock module of Compute.Access is a project that has the objective of reducing the possibility of unrestricted access to offices. The basic idea is to use the barcode on staff and students’ identification cards along with face recognition techniques to determine if an individual that intends to enter an office is authorized. The motivation behind the project includes reducing recurrent costs, as well as increasing functionality. Purchasing an existing option off the market would expose the university to a cost of approximately $100 million over a period of 10 years. As a result, the Principal has decided to approve a project to develop a prototype with a preliminary estimated budget of $5 million. The additional required functionality allows cross referencing a picture of an individual aiming to enter an area with the ID presented, as well as allowing an authorized person to indicate whether there is duress. If a duress signal (to be determined) is detected, control of the door is passed directly to a security unit, along with a video feed of the door area. It is assumed that the items listed in appendix A can be outsourced. On demand reports of user accesses should be available.
The prototype is to be installed at the main Computing office on the third floor, however full documentation of the procedures used to create the product is expected to allow easy replication to other locations. It is important that the system be completed and tested at a point in time when traffic is low, and as such the system needs to be completed by December 2023 to allow testing in the first week of January 2024.

Charter Approvals

Project Manager..............................................................Date.....................................................

Sponsor .......................................................................Date.....................................................

Network Manager ...........................................................Date.....................................................

Chief of Security..............................................................Date.....................................................

Appendix A.

Purchase Magnetic Lock. (Duration 5 days; Cost $100,000)
Purchase Camera and Network Storage Device. (Duration 2 days, Cost $150,000)
Install a Network Connection. (Your solution may include several) (Duration 5 days, Cost $40,000)

Question 1

Define a WBS to describe the deliverables expected for Compute.Access.SeeLock. To normalize the work done, your WBS will be created using the following guidelines:

1. High Level deliverables should be Hardware, Software and Procedures
2. There should be three levels in the WBS (note not all deliverables may need three levels) 3.The number of work packages should be between 10 and 15

Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Requirement Gathering
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Information Technology Project Management
Information Technology Project Management
Computer Science
ISBN:
9781337101356
Author:
Kathy Schwalbe
Publisher:
Cengage Learning