Free Essay

Assignment 6-1

In:

Submitted By pl8er
Words 674
Pages 3
Assignment 6-1

AMGT390-F1WW (SU10)

Justin Reed

August 6, 2010

Professor Clark

Lexi Electronics problem:

Lexi Electronics is nearing completion of a two-year project to develop and produce a new digital phone. The phone is no bigger than a Popsicle stick but has all the features of a standard digital cellular phone. The assembly line and all the production facilities will be completed in 5 months. The first units will be produced in 8 months. The plant manager believes it is time to begin winding down the project. He has there methods in mind for terminating the project: extinction, addition, and integration. He is not sure which method is best.

Question: Which of the three methods would you recommend, and why? (Mantel, Meredith, Shafer, & Sutton, 2007)

Let’s first look at the books definition of each of these and this will help us to define which are the best for this scenario. First, we will look at termination-by-addition. This occurs when an “in-house” project is successfully completed and institutionalized as a new, formal part of the organization. This may take the form of an added department, division, subsidiary, or other such organization entity, depending on the magnitude of importance of the project. (Mantel, Meredith, Shafer, & Sutton, 2007)

Although this seems like a good route to take for termination of this project, the fact that Lexi Electronics already is a producer of this type of item, and this is just a variation requiring a new line, I feel that this does not offer the best termination option. The department would still be the cell production facility just that it is now adding another production line to this department.

Next we look at termination by starvation. This often occurs when it is impolitic to terminate a project but its budget can be squeezed, as budgets always are, until it is a project in name only. (Mantel, Meredith, Shafer, & Sutton, 2007)

This is not a solution for this, at all. The reason is obvious, the project is already being considered for termination as a success. The production line is being completed and they have a live date for when they will implement the new phones. The budget, although undefined, can be estimated to be within tolerances and the project will finish and move to production.

Termination by extinction means that it was either successfully completed or because the expectation of failure was high. Successful projects are complete and delivered to the client. Failure occurs when the project no longer meets cost/benefit criteria, or when its goals have been achieved by another project, often in another firm. Extinction also means that the project suddenly stops (Mantel, Meredith, Shafer, & Sutton, 2007)

Although this is a good option for termination, normally this occurs when the project suddenly stops with property, equipment, materials and personnel to disburse. This would work as a completed project but my opinion is that the project is still in motion however it is winding down. Extinctions definition says that everything has halted. I would not terminate with this method because we do not see a clear stop of the project for some time to come.

The next termination type is integration. The output of the project becomes a standard part of the operating systems of the sponsoring firm, or the client. The new software becomes the standard, and the new machine becomes a normal part of the production line. (Mantel, Meredith, Shafer, & Sutton, 2007)

This appears to be the best termination type to use. Because this will become integrated into a department in the company, and most likely the most advanced item, we can expect this to be a standard using all of the newest and best components, machinery and also personnel. Because of the size improvement, you would expect that the technology would become a standard that would be distributed to all of the other products that were to be produced in the future.

References

Mantel, Samuel, Meredith, Jack, Shafer, Scott, & Sutton, Margaret. (2007). Project management in practice. Wiley.

Similar Documents

Free Essay

Unit 6 Assignment 1

...Unit 6 Assignment 1: Cable Testers In almost every application in dealing with cable installations, cable testing is a must. Some methods of testing cables include testing for attenuation, continuity testers, DC Resistance, a wire mapper and cable length. In all cable types- copper or fiber, 10BASE-T or 100BASEFX, the standards are constantly being changed and developed into a new standard for all future technologies. When testing cable, you can guarantee that the users will be satisfied when all connections prove effective for not just uninterrupted transmission but correct bandwidths to support. A wire mapper is the most common tool. It simply provides a test of a standard Cat5 cable to ensure each individual wire not only carries a strong signal through the entire length of the route, but it proves if each wire ends up in the correct pin number on the opposite end to receive the transmission. It will give the technician an idea if a cable has a short, or if it is a crossover cable. It is also very useful with telephone connections. It should be a part of each cable installation kit. Another common tool is a continuity tester. It shows if there is a direct connection between two points. If there is a closed electrical pathway for the tester to detect, then the device will make a sound. This is useful not only to test for a short, but also to determine and identify which cable is which in a closet full of many cables. This is also a very important tool in any application...

Words: 437 - Pages: 2

Premium Essay

Week 6 Assignment 1

...Did Jim and Laura Buy a Car Week 6 Assignment 1 Matthew Ader Professor Lori Baggot LEG 100 Feb 14 2016 A contract is an agreement that creates an obligation that is enforceable by the law. The law has clear guidelines that before there exists a contract that will be binding, there has to be an offer, acceptance, mutual obligation and all parties should be of sound mind and by law be of legal age. A contract can either be written or spoken. Assuming that the buyers were at the required age went to the car dealership looking to purchase a new car. Stan the salesman made an offer to Jim and Laura and they both agreed to the terms. They asked that Stan the salesman hold the car for a day. He told them to put down $100 dollars to hold the car and that it would go to the final purchase of the car or that it would be refundable. Jim and Laura just wanted to hold the car so that it would still be there the next day. With mutual understanding Stan the salesman keeps the car and calls the next day to confirm when the purchase would be completed. I do believe that Jim and Laura did not enter into a legal contract that is binding. There are several factors that do not exist that would show a legally binding agreement. Like a contract that both parties would sign, agreeing to the purchase of the car. Having a contract in writing that both parties signed could show the sale of the car. Stan the salesman let Jim and Laura have a chance to test drive several cars that they were interested...

Words: 760 - Pages: 4

Premium Essay

Unit 6 Assignment 1

...IS3340-WINDOWS SECURITY | Minimizing Recovery Time Strategies | Unit 6 Assignment 1 | | | 5/5/2014 | | This document outlines the required steps to follow, in-order to properly scan the necessary servers and workstations in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA(Microsoft Baseline Security Anaylizer) •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. * Check...

Words: 487 - Pages: 2

Premium Essay

Unit 6 Assignment 1

...Chapter 6: Conceptual Review Questions (All Questions worth 5 points each) Match the information below with Questions 1 through 14. |A. Compound Interest |E. IRR |I. PMT |M. ROI | |B. CUMPRINC |F. NPER |J. PPMT |N. Simple Interest | |C. FV |G. NPV |K. PV |O. SLN | |D. IPMT |H. Payback Period |L. RATE |P. Type | 1. Function to calculate the interest percentage per period of a financial transaction 2. Function to calculate the value at the beginning of a financial transaction 3. Function to calculate value of the end of a financial transaction 4. Function to calculate periodic payments in or out of a financial transaction 5. Function to calculate the number of compounding periods in a financial transaction 6. Use a “1” for this argument to indicate that interest will be paid at the beginning of each compounding period 7. This type of interest is calculated based on original principal regardless of the previous interest earned 8. This type of interest is calculated based on principal and previous interest earned 9. Function to calculate straight line depreciation based on the initial capital investment, number...

Words: 622 - Pages: 3

Free Essay

Unit 6 Assignment 1

...Cable Testers: How They Work and With Which Cable System ITT Technical Institute Physical Networking – NT1310 10/27/2014 After any size cable installation the technicians should check for errors, performance issues, signal loss and check for equipment that may cause interference and degrade network performance. The following paragraphs describe three (3) cable testers and how they work and which cable system(s) they are most suitable for. The first tester is the wire-mapper. Wire-mappers are used primarily with copper twisted-pair cable installations. These devices, according to Oliviero and Woodward (2011, p.422, 441) “Transmit signals through each pair in a twisted-pair cable to determine if it is connected correctly to the correct pin at each end.” The second tool is the tone generator. A tone generator is a two-piece unit that consists of a tone generator and a probe. This type of tester's primary function, amongst installers, is to identify specific locations in a punch-down block then label accordingly. According to Oliviero and Woodward (2011, p.442-443), these testers “Transmit[s] a signal, or, with an alligator clip, you connect the unit to an individual wire. The other unit is an inductive amplifier, which is a pen-like probe that emits an audible tone when touched to the other end of the conductor.” Primary functions are identify a particular cable within a bundle and to test for opens, shorts, and miswires of individual wires. Unfortunately, there is...

Words: 399 - Pages: 2

Premium Essay

Unit 6 Assignment 1

...Used to connect devices that contained DB9 pin connections usually mouse’s and keyboards. In todays computers Serial Ports have all been upgraded to USB ports. • Parallel Port- Used to connect printers or external devices such as hard disk drives. Parallel Parts are unique with a DB25 pin connection. They call it DSUB or DB25 cause the connection looks like a D • SRAM- also known as (Static random access memory) is a type of semiconductor memory where the word static indicates that, unlike dynamic ram or DRAM, it doesn’t need to be periodically refreshed. • DRAM- also known as (Dynamic Random Access Memory), DRAM is one of the most commonly found memory modules in PC compatible personal computers and workstations. Though out the assignment I have learned and gave my self a clear understanding on what certain terms and well older technology that has paved the way for our new technology to exist. The...

Words: 340 - Pages: 2

Premium Essay

Nt Unit 6 Assignment 1

...Unit 6. Assignment 1. AD User/Group Design Scenario Dear Junior Admin, I received your E-mail and in response I recommend that you do the following. Since there is a domain for each department, such as Marketing, accessing one printer is rather easy. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the marketing domain local group. For HR, you will need to take all of the users within the forest and add them to a global then universal group. Proceed to take the universal group and add it to the domain local group within their domain. These users will then have access to whatever is in that universal group, therefore you must make sure that you assign the printer for them to print vacation requests to the HR department. You must take a slightly different approach for R&D. To allow access to only the server, you must first create a domain local group that has some administrative rights. Add them to a customized admins group that you have control of. You can assign these rights and permissions as you create and assign them. Remember to limit their access to their local machines only. You can do all of this through the desktop local user account settings. You may also take a different route if you choose to. This is one of the approaches you may take...

Words: 288 - Pages: 2

Premium Essay

Unit 6 Assignment 1 Questions

...Unit 6 Assignment 1: Homework Learning Objectives and Outcomes Name the main events in the development of SQL statements. Run SELECT queries with wild cards, DISTINCT key word, calculations, sorting and aliasing. Run queries with the WHERE clause to filter the result sets. Use the Aggregate functions COUNT, AVG, SUM, MIN, and MAX. Assignment Requirements Answer the true-or-false questions on the next page by filling out the answer sheet. Required Resources Textbook Submission Requirements Submit your completed answer sheet to your instructor at the beginning of Unit 7. Unit 6 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) SQL is the programming language used to manipulate data and data objects in a relational database management system. 2) SQL is a procedural language. 3) A declarative language is a language in which you tell the computer what to do not how. 4) DML, or Data Manipulation Language, contains all the commands for selecting and modifying data. 5) DDL, or Data Definition Language, contains all the commands for selecting and modifying data. 6) The * in SELECT * clause of an SQL statement is a wildcard for returning all columns in a table. 7) The DISTINCT keyword in a SELECT statement returns only unique rows. 8) The FROM keyword is used in a SELECT clause to determine which columns are included in the query. 9) An alias in SQL is a substitute...

Words: 363 - Pages: 2

Free Essay

Is3340 Unit 6 Assignment 1

...IS3340 Unit 6 Assignment 1 1. How much data has been modified between the last backup and the time of failure? No data should have been lost since nothing was change since the last backup and the backup would have been completed before the error occurred. 2. What images are necessary to recover the workstation? The images that are necessary would be the reimaging image along with the latest back up image available. 3. What are the steps necessary to fix the problem that cause the data loss? Verify what caused the loss by reading the logs. Determine the fix for the issue. Reimage the computer. Restore the computer to last backup state and disable the issue that caused the data loss. 4. What steps should Ken 7 take to avoid a reoccurrence of this issue in the future? Read the logs to find out what caused the issue that caused the data lose.   Right a procedure guide to prevent the issue from occurring. Alert users of the occurrence of the issue and the way to prevent the issue. (Soloman, 2001) Procedure Guide: 1. Read logs to decide what cause the issue to occur. 2. Re-Image the computer to default configuration. 3. Restore to first available backup of the system. Restore Process: 1. Right-click on your Computer desktop icon (or click Start and right-click on the Computer tab on the right pane of the menu). 2. Click on Properties. 3. Locate the System protection tab in the System Properties menu. 4. Select the hard disk that you...

Words: 393 - Pages: 2

Premium Essay

Unit 6 Research Assignment 1

...Database Concepts Unit 6 Research Assignment 1: Explore the latest ANSI and ISO Standard True/False 23-Jul-2016 Tim Church Daigre ANSI- The American National Standards Institute (ANSI) oversees the creation, promulgation and use of thousands of norms and guidelines that directly impact businesses in nearly every sector: from acoustical devices to construction equipment, from dairy and livestock production to energy distribution, and many more. ANSI is also actively engaged in accreditation - assessing the competence of organizations determining conformance to standards. To enhance both the global competitiveness of U.S. business and the U.S. quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems, and safeguarding their integrity. ISO- International Organization for Standardization (ISO) is an independent, non-governmental international organization with a membership of 163 national standards bodies. Through its members, it brings together experts to share knowledge and develop voluntary, consensus-based, market relevant International Standards that support innovation and provide solutions to global challenges. Part II- The latest SQL standard was adopted in July 2003 and is often called SQL:2003. One part of the SQL standard, Part 14, SQL/XML (ISO/IEC 9075-14) was revised in 2006 and is often referenced as "SQL/XML:2006". ANSI/ISO/IEC 9075:2003, "Database Language SQL", Parts 1 ("SQL/Framework"), 2 ("SQL/Foundation")...

Words: 278 - Pages: 2

Free Essay

Pt1420 Unit 6 Assignment 1

...Week 06 Assignments Textbook Reading * Chapter 4 * Chapter 5 sections 5.1, 5.2, and 5.3 (pages 196-201) Week 06 Homework From the Gaddis textbook: * Programming Exercises 2, 6 and 9, on pages 160-161 For the Programming Exercises, design a program means write the pseudocode for the program. Except for Programming Exercise 2, your design should include multiple modules, not just main(). Upload a Microsoft Word document with the pseudocode to your shared PT1420 community website or submit a paper copy to your instructor by the beginning of the Week 7 class. Programing Exercises pg. 160-161 2. Areas of rectangles Module Main() Declare width1 integer = 0 Declare length1 integer = 0 Declare width2 integer = 0 Declare length2 integer = 0 Declare area1 integer = 0 Declare area2 integer = 0 Call rectangle1 (width1, length1, area1) Call rectangle2 (width2, length2, area2) Call comparison (rectangle1, rectangle2) Display “press enter to continue” End module Module rectangle1 (value width1 as integer, value length1 as integer, value area1 as integer) Display "Enter the width of rectangle 1” Input width1 Display "Enter the length of rectangle 1" Input length1 area1 = width1 * length1 End module Module rectangle2 (value width2 as integer, value length2 as integer, value area2 as integer) Display "Enter the width of rectangle 2” Input width2 Display "Enter the length of rectangle 2" Input length2 area2 = width2 * length2 End module ...

Words: 764 - Pages: 4

Premium Essay

Nt1310 Unit 6 Assignment 1

...Assignment Ans A: LDD is used in NMOS only, LDD is used to reduce the electric field strength, the gate-drain capacitance and the hot electron impact ionisation effect. LDD reduces the drain-bulk depletion region at the reversed biased junction diode. Therefore LDD reduces leakage current through this diode B: The value of SPACE.MULT is the amount by which the grid spacing specified in the ATHENA Mesh Define menu is multiplied. A value for SPACE.MULT that is greater than will reduce the total number of grid points. A SPACE.MULT value that is less than will create a finer mesh throughout the initial structure. Reducing the number of grid nodes greatly increases speed. C: Just the doping below the gate has a significant influence on the final...

Words: 645 - Pages: 3

Premium Essay

Pt1420 Unit 6 Assignment 1

...The worst case scenario experienced resulted to be the exposition of comments containing key pair values published on the GitHub repository; it was used by hackers to launch instances by spot requests in different regions that are not monitored frequently. Opportunely, the AWS security team could detect this leak of information and proceeded to handle this problem creating a case. Unfortunately, when their team sent the information, the intruders had already placed their Spot instance requests. Concluding, a frequent monitoring is needed and the credentials are to be handled locally (.aws and .ssh folders) with the appropriate permissions and never used as static values in the code. A total of US$ 638.48 (Figure 1) was charged in 2 days, AWS security team assigned Credits to solve this...

Words: 1197 - Pages: 5

Free Essay

Is3230 Unit 6 Assignment 1

...You are provided with the following list of privileges, roles, rights, and actions: 1. Must authenticate when accessing network resources 2. Is allowed remote access 3. Periodically reviews all user accounts 4. Authorizes risk assessments 5. Performs security assessments 6. Creates group policy objects 7. May send inbound e-mail 8. Is allowed to install software in a secured network 9. Performs daily log reviews 10. Is allowed to change the firewall rules 11. Manages incident response 12. Provides user awareness training 13. Access the file system within authorized system and groups 14. Develop infrastructure architecture plan 15. Manages Internet service provider (ISP) and Internet connectivity 16. Install patches on production system 17. May delete files from group folder 18. Installs security software 19. Create system users 20. Monitors systems for dormant accounts 21. May request file system changes 22. Develops and implements configuration standards 23. Grants access to resources 24. Create user accounts 25. May make file system changes 26. Run a backup program to capture changes to data and systems 27. May appoint a data/application custodian 28. May disable/delete unused accounts 29. May bypass authentication 30. Approves access to resources In the table given below, you need to relate the matching privileges, roles, rights, and actions to the account type on the left...

Words: 269 - Pages: 2

Premium Essay

Pt1420 Unit 6 Assignment 1

...Scenario 6 Additionally, in order to calculate the probability that exactly 1 marriage will be in the stock, one would apply the same formula as before. Since the stock is composed only of three cards, there could only be 1 marriage. There are 22 possible cards to receive (n) which are not a marriage since there can only be 1 other card (r). It doesn't matter whether the other card would be a pair card or not since it couldn't be a marriage by itself. There are four diverse marriages which means there could be four various marriages with 1 different card from the 22 other cards. This probability is extraordinarily low. It's the lowest probability of all. From my personal experience playing this game, it seems to be true, however, in an actual game the fact that players get cards one by one and not in a row, alters the probability and decreases it even more. The probability of getting exactly 1 marriage in the stock is exceedingly low itself. Rarely does it happen, that there is a pair in the stock which supports this calculation....

Words: 463 - Pages: 2