post mortem and wrap up - Computer Science
Project rollout begins after a project has been implemented, tested, and judged stable and functional enough to be moved into production. The project rollout process comprises specific steps that must be scheduled carefully to enable the project to hit production deadlines and meet business expectations.
For this assignment, you will create an implementation project plan, which outlines the steps involved in implementing your project. This document is sometimes called a work-back schedule because you begin with the date that your project needs to go live, and then work back from there to determine what needs to be done when.
You will also conduct a post-mortem on the work you have submitted to date. Post-mortem (from the Latin for “after death,” but referring to it in the context of business) is the analysis of a project’s process and results conducted by key project stakeholders after the project has been moved into production, which means it’s functionally complete. The goal of a post-mortem is to identify what went right and what went wrong post-implementation so that project managers can apply these lessons learned to future projects.
For this three-part assignment, you will:
Construct a work-back schedule that presents the steps involved in implementing your project.
Construct a post-mortem using the template on the work you have submitted to date in this course.
Create updated project documents based on the results of your post-mortem.
Review the Project Implementation Plan Example.
Create a project implementation plan for your project based on the example document. You may use Microsoft Word or other software to create your project implementation plan.
Complete the Post-Mortem template based on your experiences with completing the course project over the last five weeks.
Update the project documents you have submitted thus far in the course based on your completed post-mortem.
Submit your project implementation plan, post-mortem, and updated project documents.
BSA/425 v1.3
Post-Mortem
BSA/425 v1.3
Page 2 of 2
Post-Mortem
Use the table to list the things that went well during the completion of this 5-week project and the things that didn’t go well.
Date:
Project Manager (your name):
Project Name:
5 Things that Went Well During the Project
5 Things that Could Have Been Done Better
Below, discuss all 10 things from the list above in detail. As a project manager, or participant, what processes might you put in place to ensure the same things go well on future projects you’re involved in? What processes can you put in place to improve the not-so-great things on future projects? Be specific.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Implementation Plan Example
BSA/425 v1.3
Page 2 of 2
Project Implementation Plan Example
Replace the italicized information with information relevant to your project.
Project Name:
Implementation Phase:
Project Plan:
Task
Activity Name
Resource
Schedule Start Date
Schedule Finish Date
Schedule Comments
Prepare for Implementation
Identify the implementation team
CIO/Project Sponsor
6/4/2018
6/8/2018
Order server hardware for production environment and test/QA environment
IT Manager/CIO
6/4/2018
6/29/2018
Order client hardware for production environment and test/QA environment
IT Manager/CIO
6/4/2018
6/29/2018
Order Cloud Computing Services and software subscriptions
IT Manager/CIO
6/4/2018
6/29/2018
Obtain on premise software applications
IT Manager/CIO
6/4/2018
6/29/2018
Create user IDs and groups for on premise technology
System Admin
7/2/2018
7/13/2018
Create security infrastructure for production and test/QA environment
System Admin
7/2/2018
7/13/2018
Prepare Test Environment
Install test/QA servers and software
System Admin
7/16/2018
7/20/2018
Install test/QA client machines and software
System Admin
7/16/2018
7/20/2018
Configure test/QA environment
System Admin
7/16/2018
7/20/2018
Prepare Production Environment
Install production servers and software
System Admin
7/23/2018
7/27/2018
Install production client machines and software
System Admin
7/23/2018
7/27/2018
Configure production environment/ integrate with cloud service architecture
System Admin
7/23/2018
7/27/2018
Data Conversions
Perform data conversions and loading into the test/QA environment
Data Specialists
7/13/2018
8/10/2018
Perform data conversions and loading into the production environment
Data Specialists
7/13/2018
8/10/2018
Documentation
Ensure all documentation applicable to implementation is available
Documentation Specialists/Technical Writers
6/11/2018
8/17/2018
Training
Provide administrator training
Trainers
8/13/2018
8/17/2018
Provide support training
Trainers
8/13/2018
8/17/2018
Provide end-user training
Trainers
8/13/2018
8/17/2018
Go-Live
Production Go-live
CIO/Project Sponsor
8/27/2018
8/27/2018
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 9 of 9
Project Plan Draft
Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project.
Company Name: XYZ Bank
Network Technology Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points IN a Scale of 10)
LAN
It connects a number of computers or low-voltage devices across a short distance.
5
WAN
Long distance computer connection
5
WLAN
Does not require the physical devices as it operate like Wi-Fi
8
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Very fast, best customer service
Expensive
Heavy network in the organization
9
Alloys
Cheap, better customer service
Poor network
Encryption of user data
5
Aruba
Cheap, superb network
Poor network
Software for organizational services
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Physical vs logical deployment
The appliances in physical networks are connected via protocols, but in logical networks, other traffics are used which are indifferent to physical networks and must be run.
Scalability and automatic deployment
Not only must the networks be automated, but they must also be scalable.
Bringing separate own network
When installing a network in a data center architecture, an automated and quicker deployment is preferable.
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed technology must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed technology
Training of employees
Organization employees’ needs be trained on the internet and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase the number of employees
$3000
High productivity
Construction of new block
$50000
Installation of the proposed system and components
Database System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Terms of reference definition
The purpose of the project
5
Products shortlisting
Selecting the best database management system (DBMS)
8
Products evaluation
Thorough analysis of the selected DBMS
4
Recommendation
Findings and analysis of the right organization
9
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Desktop
Entering and logical storage of user data
High speed in data processing
4
Relational
Tables arranged in schemas in a particular server
Storage of multiple data
5
Normalization
Processing and breaking up of data
Ais in sorting of database documents based on defined criteria
7
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
5
Security
Data must be well protected from attacks
9
Convenience
Data must be utilized without previous errors
7
Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
Support cloud services, very powerful
N/A
Cloud database management as well as employee training
8
Microsoft SQL
Widely used globally
N/A
Easily integrated with Microsoft products such as Word, Excel etc
6
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data and information security
Currently there are numerous cyber security attacks
Performance
The performance of the system can face issues
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed database must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed database technology
Training of employees
Organization employees’ needs be trained on the database management and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Purchase of the new database system
$5000
It will assist the firm in better storing and retrieving its expanding volumes of data.
Software Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Industry and business expertise
This is the proportion of employees having IT expertise in the firm.
8
Program management
The program and project must be complicated, and the organization must be competent to handle it.
5
Understanding the market
Our program must be compatible with our businesss market.
7
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
Browsers
Such as Chrome
Accessing the internet
7
Microsoft office suite
Consist of Ms Word, Excel, PowerPoint, Access among others
Management of organization documents
6
Mobile application
Like Skype
Communication
7
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Broad needs definition
Type of the required application is checked
5
Report capabilities checking
The selected software has to define the company summary well
8
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all kind of software products revenue
Other service revenue not included
It supplies advanced software for the firm.
9
SUN GUARAD
Revenues from FIS worldwide are supported
Maintenance of the software is not included
The transactions are computed using a derived value, that is the same as a direct software license.
8
Salesforce
Includes all kind of sales service software
Other service revenue not included
It includes revenue-generating marketing apps and a cloud app.
7
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The software can be attacked by cyber criminals
Performance
The performance of the software can face issues
Insufficient knowledge
The users of the software may not have sufficient knowledge on their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed software applications
Training of employees
Organization employees’ needs be trained on software control and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
New computers buying
$2000
The new computers will be installed the new software applications
Employing new staff
$3000
The new employees will make sure that the software is properly utilized.
Cloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
4
Security
The software applications must be well protected from attacks
9
Convenience
The software applications must be utilized without previous errors
8
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Google Drive
15GB capacity
Best in team collaborations
10
Dropbox
2GB limit
Best in small devices like smartphones
8
Box
10GB limit
Best in enterprise solutions
7
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Standard compliance
The cloud service providers must comply with the government set standards
8
Data security
The service providers must ensure the user data is protected
9
Service roadmap
The organization objectives must be met through project implementation
7
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all additional computer and database storage
N/A
Business integration is made easier for users
9
Google cloud
Famous worldwide
N/A
Best in google searches and YouTube services
8
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The cloud servers can be attacked by cyber criminals
Performance
The performance of the cloud servers can face issues
Insufficient knowledge
The users of the cloud services may not have sufficient knowledge on their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed software applications
Training of employees
Organization employees’ needs be trained on software control and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase the number of employees
$1000
The new employees will be responsible for controlling the cloud services.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 9 of 9
LEWIN’S INTERNET BANKING COMPANY
Project Plan Draft
Fill out each of the sections below with information relevant to your project. Be sure to include the company name associated with your project.
Company Name: XYZ Bank
Network Technology Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points IN a Scale of 10)
LAN
It connects a number of computers or low-voltage devices across a short distance.
5
WAN
Long distance computer connection
5
WLAN
Does not require the physical devices as it operate like Wi-Fi
8
VWLAN
Decreases network resources wasted by acting LAN segments and reduce collisions
9
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Very fast, best customer service
Expensive
Heavy network in the organization
IOs optimization better experience and great mobile experience
9
Alloys
Cheap, better customer service
Poor network
Encryption of user data
5
Aruba
Cheap, superb network
Poor network
Software for organizational services
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Physical vs logical deployment
The appliances in physical networks are connected via protocols, but in logical networks, other traffics are used which are indifferent to physical networks and must be run.
Scalability and automatic deployment
Not only must the networks be automated, but they must also be scalable.
Bringing separate own network
When installing a network in a data center architecture, an automated and quicker deployment is preferable.
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed technology must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed technology
Training of employees
Organization employees’ needs be trained on the internet and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase the number of employees
$3000
High productivity
Construction of new block
$50000
Installation of the proposed system and components
Database System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Terms of reference definition
The purpose of the project
5
Products shortlisting
Selecting the best database management system (DBMS)
8
Products evaluation
Thorough analysis of the selected DBMS
4
Recommendation
Findings and analysis of the right organization
9
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Desktop
Entering and logical storage of user data
High speed in data processing
4
Relational
Tables arranged in schemas in a particular server
Storage of multiple data
5
Normalization
Processing and breaking up of data
Ais in sorting of database documents based on defined criteria
7
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
5
Security
Data must be well protected from attacks
9
Convenience
Data must be utilized without previous errors
7
Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
Support cloud services, very powerful
Oracle database may not be ideal because it is complexity and users need high technical ability to operate
Cloud database management as well as employee training
8
Microsoft SQL
Widely used globally
Complicated licensing and expensive
Easily integrated with Microsoft products such as Word, Excel etc
6
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data and information security
Currently there are numerous cyber security attacks
Performance
The performance of the system can face issues
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed database must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed database technology
Training of employees
Organization employees’ needs be trained on the database management and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Purchase of the new database system
$5000
It will assist the firm in better storing and retrieving its expanding volumes of data.
Software Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Industry and business expertise
This is the proportion of employees having IT expertise in the firm.
8
Program management
The program and project must be complicated, and the organization must be competent to handle it.
5
Understanding the market
Our program must be compatible with our businesss market.
7
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
Browsers
Such as Chrome
Accessing the internet
7
Microsoft office suite
Consist of Ms Word, Excel, PowerPoint, Access among others
Management of organization documents
6
Mobile application
Like Skype
Communication
7
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Broad needs definition
Type of the required application is checked
5
Report capabilities checking
The selected software has to define the company summary well
8
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all kind of software products revenue
Other service revenue not included
It supplies advanced software for the firm.
9
SUN GUARAD
Revenues from FIS worldwide are supported
Maintenance of the software is not included
The transactions are computed using a derived value that is the same as a direct software license.
8
Salesforce
Includes all kind of sales service software
Other service revenue not included
It includes revenue-generating marketing apps and a cloud app.
7
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The software can be attacked by cyber criminals
Performance
The performance of the software can face issues
Insufficient knowledge
The users of the software may not have sufficient knowledge on their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed software applications
Training of employees
Organization employees’ needs be trained on software control and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
New computers buying
$2000
The new computers will be installed the new software applications
Employing new staff
$3000
The new employees will make sure that the software is properly utilized.
Cloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
4
Security
The software applications must be well protected from attacks
9
Convenience
The software applications must be utilized without previous errors
8
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Google Drive
15GB capacity
Best in team collaborations
10
Dropbox
2GB limit
Best in small devices like smartphones
8
Box
10GB limit
Best in enterprise solutions
7
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Standard compliance
The cloud service providers must comply with the government set standards
8
Data security
The service providers must ensure the user data is protected
9
Service roadmap
The organization objectives must be met through project implementation
7
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all additional computer and database storage
N/A
Business integration is made easier for users
9
Google cloud
Famous worldwide
N/A
Best in google searches and YouTube services
8
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The cloud servers can be attacked by cyber criminals
Performance
The performance of the cloud servers can face issues
Insufficient knowledge
The users of the cloud services may not have sufficient knowledge on their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the proposed software applications
Training of employees
Organization employees’ needs be trained on software control and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase the number of employees
$1000
The new employees will be responsible for controlling the cloud services.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Proposal Template
BSA/425 v1.3
Page 2 of 7
Banking E-Services Project Proposal
Fill out each of the sections below with information relevant to your project and add your company’s name.
Company Name: XYZ Bank
Project Proposal: Internet Banking System
Project Scope Statement
Project Title
Banking e-Services
Project Sponsor(s)
XYZ Bank
Business Context for the System
The proposed internet bank project needs to implement accounts and deposits, credit, debit and travel cards, insurance, tax services, investment as well as insurance services.
Project Scope Description
IT infrastructure, Data and system security, network, applications among others.
Date Prepared
13th July, 2021.
Prepared By
Student Name
Problems/Issues/Opportunities the Proposed System Expected to Solve
Problems
Issues
Opportunities
Network problem
Hacking
Security
Malicious activities
It makes the system more secure and up to date with installation of antivirus, firewall and applying data encryption.
Project Objectives
Project Objective Name
Project Objective Description (In terms of Issues and Opportunities)
Transactions, Balances, Statements, Accounts
Issues:
Security, Technical difficulties, sometimes difficult to access, network glitches.
Opportunities:
Time saving, user-friendly, safe, time-saving, and password and id-based authentication
Objective definition:
Clients data is fed into the system, and it provides as much information and services as it can, such as maintaining accounts, balances, and records of deposits and withdrawals, all while maintaining a highly secure infrastructure and fewer network issues. The technical infrastructure should be robust and easy to use.
Project Deliverables
Project Deliverable Name
Project Deliverable Description (In terms of Issues and Opportunities)
ATM, servers, infrastructure, applications as well as other devices
Issues:
Occasionally they stop working, or there is an issue with accessibility, such as a slow internet connection or poorly designed applications that are not user friendly.
Opportunities:
It can give the people an opportunity to learn new technical ideas hence saving time and cost
Project Acceptance Criteria
Project Acceptance Criteria Name
Project Acceptance Criteria Description (In terms of Issues and Opportunities)
User name, mobile number, account number, address, additional codes
Issues:
A user can miss to fill some important information due to misunderstanding, or others just prefer manual work
Opportunities:
It gives the users an opportunity to enhance the computer knowledge by working using their smartphones and laptops.
Project Exclusions
Project Exclusion Name
Project Exclusion Description
Hardware requirements
This project will not build the hardware needed for the implementation. However, it will focus on the integration and configuration of the hardware with the software.
Project Constraints
Project Constraint Name
Project Constraint Description (In terms of Issues and Opportunities)
Assistance, network, security, inflexibility
Issues:
People may want help while doing online transactions, for instance, when operating an ATM machine. Even though network brokerage is a regular occurrence, security measures might be poor sometimes, thus banks should employ antivirus and firewalls in their systems.
Opportunities:
It makes the system more transparent by making information more readily available, and it may be made more scalable by emphasizing the significance of online banking to the public.
Project Assumptions
Project Assumption Name
Project Assumption Description (In terms of Issues and Opportunities)
Service oriented, Customer driven
Issues:
While there are interruptions when providing services, it totally meets the demands of the population. As a result, meeting client needs should be a top priority.
Opportunities:
It can acquire a better understanding of what customers require in order to meet their needs, and it can install all of their services on their website, making work easier.
Project Methodology
i The website should be simple to use. Develop a vision and work on it, such as what all consumer demands you can meet with the website, and so on.
ii Design as many templates as possible, and align the website creation and success methods.
iii It should be adaptable as well as simple to use even remotely and at any time.
iv It is highly scalable and can meet the demands of a large number of employees, as well as feed consumer data into the system.
v Available 24 hours a day, 7 days a week.
vi It should be customer-focused.
High-Level Work Schedule: Project Scope
Description of Work
Assumptions and Constraints
Build a system that allows one to make payments as well as other type of transactions online.
Basic computer knowledge
System requirements met
Assistance
Security
Network
Infrastructure
Milestones
Due Dates
Project approval
Requirements review
Design approval
Planning
Requirement’s definition
Designing
Development and implementation
Final approval
Deployment
Maintaining
20th July, 2021
31st July, 2021
5th August, 2021
11th August 2021
17th August 2021
20th August 2021
30th August 2021
21st September 2021
30th September 2021
15th October 2021
ID
Activity
Resource
Labor Hours
Labor Rate (USD)
Labor Total
Material Units
Material Cost
(USD)
Material Total
Total Cost
1
Deposit and withdraw money
ATM, software, computer
80
400
32000
10
1000
10000
42000
2
Make online payments
Mobile application, software
50
300
15000
5
500
2500
17500
3
Borrow loans
Mobile application, software, computer, mobile phones
40
300
12000
5
600
3000
15000
4
Verify user transactions
Software, computer
40
200
8000
6
300
1800
9800
5
Insurance activities
Software, computer, mobile phones
80
400
32000
15
400
6000
38000
Quality Requirements
Reliability, Availability, Usability, Customer service, Customer experience, Performance, Maintainability
Acceptance Criteria
Clear project mission, Client consultation, Clear communication, Adequate resources, Monitoring and feedback mechanisms, committed project personnel, Top management support.
Technical Information
Technical Issues: Performance, Reliability and Availability
Software Requirements: Best programming language, Operating system
Agreement Information
The Recipient undertakes not to use the Confidential Information for any purpose except the Purpose, without first obtaining the written agreement of the Discloser.
The Recipient undertakes to keep the Confidential Information secure and not to disclose it to any third party [except to its employees [and professional advisers] who need to know the same for the Purpose, who know they owe a duty of confidence to the Discloser and who are bound by obligations equivalent to those in clause 2 above and this clause 3.
Signed and Delivered as a Deed by: [name of Recipient] in the presence of: ____________________
Signature ______________________________
Signature of witness _____________________
Name of Witness _________________________
Address of the witness _________________________
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
8
XYZ Bank Software Test Plan
Student Name: powede yingi
Software Test Plan
Project Name: XYZ Bank Software Test Plan
Purpose of Project: To prepare an effective software test plan for testing the organization software components and functionalities.
Features To Be Tested/Not To Be Tested
The features to be tested in this project include;
i. Software application units
ii. Software system
iii. Software integration
iv. Software performance and stress
v. Software user acceptance
vi. Software automatic regression
vii. Software beta requirements
On the other hand, the following feature will not be tested
i. Software batch. This feature will not be tested since it has low risk based on the previous risk assessment conducted.
Testing Pass/Fail Criteria
Feature
Pass/Fail Criteria (Pass definition)
Software application units
All test cases completed
All codes covered
Software system
All test cases completed
All codes covered
Software integration
All test cases completed
All codes covered
Software performance and stress
All test cases completed
Software user acceptance level
All test cases completed
Software automatic regression
All test cases completed
Software beta requirements
All test cases completed
Testing Approach
Execution of this project applied the box approach. This is a hybrid method combing the two traditional approaches. White-box and black-box testing are two types of software testing methods. These two methodologies are applied in the description of testers point of view when creating test cases. Grey-box testing is a hybrid approach to software testing methodology that can be used. The above arbitrary distinction among black- and white-box testing has faded somewhat as the concept of grey-box testing—which develops tests from specific design elements—has gained traction.
White-box testing verifies a programs internal structures or workings rather than the functionality that is visible to the end user. In white-box testing, test cases are created using an internal perspective of the system (the source code) and programming skills. The tester selects inputs in order to exercise code paths and determine appropriate outputs. It includes API testing, code coverage, fault injection among others.
On the other hand, black-box testing looks at the program as if it were a black box, assessing functionality without knowing how it works inside or viewing the source code. The testers only know what the program should do, not how it should do it. Use case testing, exploratory testing, equivalence partitioning, state transition tables, among others are all examples of black-box testing techniques.
Testing Cases
This project implementation requires implementation of the following use cases;
Test Case
Test Case Description
Test Data
Expected Result
Actual Result
Pass/Fail
1
Launch application
www.google.com
Google.com
Google.com
Pass
2
Enter valid email and password
Email: [email protected]
Password: ******
The password entered is incorrect, forgotten password?
The password entered is incorrect, forgotten password?
Pass
3
Login
Email: [email protected]
Password: ******
Login needs to be successful
Login successful
Pass
4
Verify user settings page
N/A
User preference page should be displayed
User preference page is displayed
Pass
Testing Materials (Hardware/Software Requirements)
Hardware requirements:
i. Modems
ii. Computers
Software requirements:
i. Workstation
ii. Mainframe
iii. Operating system
Testing Schedule
Testing Activity
Duration
Resource
Comments
Test Plan Creation
5 days
Test Manager
Planning entails preparation details to carry out the identified tests
Test Specification Creation
10 days
Test Leads
This phase entail identification of specific tests to be carried out.
Test Specification Team Review
5 days
Project Team
The team is selected and reviewed by defining specific roles of each member.
Component Testing
20 days
Component Testers
Individual components are tested
Integration Testing
20 days
Component and System Testers
The integration of different components is tested.
System Testing
15 days
System Testers
The complete system is tested
Performance Testing
5 days
System Testers
The performance of the system is tested.
Use Case Validation
10 days
System Testers
All the use cases defined validated.
Alpha Testing
5 days
Product Managers/Analysts
The product release details are tested
Beta Testing/Pilot Program
20 days
Pilot Program End-Users
The end user’s capability to use the software is tested.
Risks and Contingencies Matrix
Risk
Probability
Risk Type
Owner
Contingencies/Mitigation Approach
Do not have enough skilled workers to test components as they are ready for testing.
25\%
Project Resources
Testing Manager
Testing schedule will be adjusted based on available resources.
Testing team member turnover
10\%
Project Resources
Testing Manager
Adjust testing schedules. Make sure testing team members are cross-trained on testing techniques in case a team member leaves the organization.
Software hacking
50\%
Project resources
Security Manager
Training of end users.
Implementing data and information security techniques and procedures.
Inaccurate estimations
30\%
Project resources
Project Manager
Consider uncertainty while estimating
Allocate duties to different team leaders.
Effective communications.
End user engagement
25\%
Project resources
Testing Manager
Ensure end users are involved in all necessary phases of the project.
Poor quality code
8\%
Project resources
Testing Manager
Code reviews.
Clear coding standards and policies
Testing all the codes
XYZ Bank Software Test Plan
Student Name
Student ID
2
Date
Software Test Plan
Project Name: XYZ Bank Software Test Plan
Purpose of Project: To prepare an effective software test plan for testing the organization software components and functionalities.
Features To Be Tested/Not To Be Tested
The features to be tested in this project include;
i. Software application units
ii. Software system
iii. Software integration
iv. Software performance and stress
v. Software user acceptance
vi. Software automatic regression
vii. Software beta requirements
On the other hand, the following feature will not be tested
i. Software batch. This feature will not be tested since it has low risk based on the previous risk assessment conducted.
Testing Pass/Fail Criteria
Feature
Pass/Fail Criteria (Pass definition)
Software application units
All test cases completed
All codes covered
Software system
All test cases completed
All codes covered
Software integration
All test cases completed
All codes covered
Software performance and stress
All test cases completed
Software user acceptance level
All test cases completed
Software automatic regression
All test cases completed
Software beta requirements
All test cases completed
Testing Approach
Execution of this project applied the box approach. This is a hybrid method combing the two traditional approaches. White-box and black-box testing are two types of software testing methods. These two methodologies are applied in the description of testers point of view when creating test cases. Grey-box testing is a hybrid approach to software testing methodology that can be used. The above arbitrary distinction among black- and white-box testing has faded somewhat as the concept of grey-box testing—which develops tests from specific design elements—has gained traction.
White-box testing verifies a programs internal structures or workings rather than the functionality that is visible to the end user. In white-box testing, test cases are created using an internal perspective of the system (the source code) and programming skills. The tester selects inputs in order to exercise code paths and determine appropriate outputs. It includes API testing, code coverage, fault injection among others.
On the other hand, black-box testing looks at the program as if it were a black box, assessing functionality without knowing how it works inside or viewing the source code. The testers only know what the program should do, not how it should do it. Use case testing, exploratory testing, equivalence partitioning, state transition tables, among others are all examples of black-box testing techniques.
Testing Cases
This project implementation requires implementation of the following use cases;
Test Case
Test Case Description
Test Data
Expected Result
Actual Result
Pass/Fail
1
Launch application
www.google.com
Google.com
Google.com
Pass
2
Enter valid email and password
Email: [email protected]
Password: ******
The password entered is incorrect, forgotten password?
The password entered is incorrect, forgotten password?
Pass
3
Login
Email: [email protected]
Password: ******
Login needs to be successful
Login successful
Pass
4
Verify user settings page
N/A
User preference page should be displayed
User preference page is displayed
Pass
Testing Materials (Hardware/Software Requirements)
Hardware requirements:
i. Modems
ii. Computers
Software requirements:
i. Workstation
ii. Mainframe
iii. Operating system
Testing Schedule
Testing Activity
Duration
Resource
Comments
Test Plan Creation
5 days
Test Manager
Planning entails preparation details to carry out the identified tests
Test Specification Creation
10 days
Test Leads
This phase entail identification of specific tests to be carried out.
Test Specification Team Review
5 days
Project Team
The team is selected and reviewed by defining specific roles of each member.
Component Testing
20 days
Component Testers
Individual components are tested
Integration Testing
20 days
Component and System Testers
The integration of different components is tested.
System Testing
15 days
System Testers
The complete system is tested
Performance Testing
5 days
System Testers
The performance of the system is tested.
Use Case Validation
10 days
System Testers
All the use cases defined validated.
Alpha Testing
5 days
Product Managers/Analysts
The product release details are tested
Beta Testing/Pilot Program
20 days
Pilot Program End-Users
The end user’s capability to use the software is tested.
Risks and Contingencies Matrix
Risk
Probability
Risk Type
Owner
Contingencies/Mitigation Approach
Do not have enough skilled workers to test components as they are ready for testing.
25\%
Project Resources
Testing Manager
Testing schedule will be adjusted based on available resources.
Testing team member turnover
10\%
Project Resources
Testing Manager
Adjust testing schedules. Make sure testing team members are cross-trained on testing techniques in case a team member leaves the organization.
Software hacking
50\%
Project resources
Security Manager
Training of end users.
Implementing data and information security techniques and procedures.
Inaccurate estimations
30\%
Project resources
Project Manager
Consider uncertainty while estimating
Allocate duties to different team leaders.
Effective communications.
End user engagement
25\%
Project resources
Testing Manager
Ensure end users are involved in all necessary phases of the project.
Poor quality code
8\%
Project resources
Testing Manager
Code reviews.
Clear coding standards and policies
Testing all the codes
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident