0% found this document useful (0 votes)
76 views2 pages

Divide and Conquer: For Example

Project management involves dividing large projects into smaller, more manageable tasks. No single task is too complex because each piece focuses on basic work. An example problem of distributed media sharing was broken down into four modules: users, data upload, data download, and encryption algorithm. This shows the strategy of divide and conquer makes complex projects easier by separating them into interdependent sub-tasks.

Uploaded by

aparnajanwalkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views2 pages

Divide and Conquer: For Example

Project management involves dividing large projects into smaller, more manageable tasks. No single task is too complex because each piece focuses on basic work. An example problem of distributed media sharing was broken down into four modules: users, data upload, data download, and encryption algorithm. This shows the strategy of divide and conquer makes complex projects easier by separating them into interdependent sub-tasks.

Uploaded by

aparnajanwalkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Divide and Conquer

Project Management is all about dividing up a project into sections making it more manageable.
No matter how complex a project may seem, the individual work-tasks are always easy to
accomplish because it is a basic task. Below figure shows the strategy in more detail.

For Example

In case of our project we divide the problem statement in number of sub tasks in the form of
project Modules of project.

E.g. Problem statement is Distributed Media sharing. Here we divide the problem in four sub-
tasks. (For your Project Please Refer the Synopsis for Module)

1. Users
2. Data Upload
3. Data Download
4. Encryption Algorithm
Here we can see the Functional Dependency.

Distributed Media Sharing

User Registration User Data Data Download Encryption on


Share(Data Data
Uploading)

You might also like