Answer Script Template
Answer Script Template
ANSWER SCRIPT
Question :1
Answer:
I need to inform the appropriate authorities in the organization about the issue I'm having during
installation. I need to request that the issue be resolved or that support be provided in order for my
installation work to be completed. by raising awareness of the issue and advocating a solution I've
taken a brief leave of absence to allow the corporation to settle down the problem, which is being
hidden from me to others. I should avoid direct conflict, getting into disputes, or threatening people
who stand in my way of gaining and providing data to the business. You must not engage in any
criminal behavior in order to acquire access to the data that I require.
Here with respect to my domain that is provident fund I will defend the positive impact regarding the
perspective because if the system is installted and its working is fine and alright then it would be good
because the employee will be registetred in the system and at the time of leaving the employee would
be eligible to gain the provident fund But if provident funds thwart individuals who want to
manage their own money, some at least hold accounts in individual members’ names.
Participants then get back the money they and their employers contributed to their own
accounts, along with interest or investment returns. With such provident funds, the ownership
and balance resemble the arrangements
Question :2
Assume your organization and importance of the project. Nominating an organization of your choice
who’s operating in discipline of Construction/Marketing/Technology. Nominate a suitable project
Page 1 of 13
(for example road development, sub divisional development, power station, an ERP establishment,
installation, maintenance, surveying, etc.)
3. Cost estimation: The estimated cost for developing and managing the entire project should
include the infrastructure costs of project including salary, hardware, software, and other cost which
you think possible.
Answer:
Roll: 2018-SE-276
Choosing Marketing:
Project Name Roleout in e-market by filtering collaboration and naïve baye’s technique.
In scope:
Setup the system to handle all sales enquiries.
Training for the sales team on how to use the system.
Out scope:
The ability to route the complex sales enquiries, such as partnership.
Project Deliverables A customer using the project.
Project configuration system.
A Description for ordering the product.
Page 2 of 13
Acceptance Criteria The project will be accepted when it is agreed by the sale team
that the deliverables meet their need. The project will also be
considered a success if launch testing shows the customer
satisfaction is over 5 points higher than where it is now.
Make your site SEO-friendly.
Constraints The sales team are not dedicated to this project, and must fit this around
their day to day sales job.
Assumption A sales team & full project team will be available to co-create WBS.
Gantt Chart:
Page 3 of 13
Key Resources :
Terms of payment and due dates: For now due dates have not
be decided and assigned to us and for the payment, at this
level we are just grabbing affiliation from a incubation center
named “NIC Karachi” they will provide us complete setup and
office if they like our work then we will work with them.
Special Requirements: We have discussed above all the
software and hardware requirements but the most important
and special requirement is the marketing campaign. We need to
develop a campaign to specific customer to increase the sale.
Accept & Sign: If you agree then please sign the document after
reading this whole Scope of Work document.
Cost Estimation:
Page 4 of 13
Deadline:
For just an idea we have time till mid of October, 2021 and other details are mention under the
heading of schedule.
Project Closure :
OVERVIEW:
The major reason we are inspired for this project is that we are at the beginning of our careers and
will be able to put our skills to use, and it is a great platform that will be useful in the future for our
professions. It is preferable to lead from behind and allow others to take the lead, especially when
we celebrate triumph when good things happen. When there is a threat, we go to the front lines.
Then people will respect and admire our leaders.
End Project:
Simply said, it is the purchase and sale of goods and services over the internet. However, it
encompasses the full online process of creating, selling, delivering, servicing, and paying for
products and services in a wide sense. The sphere of the e-market has extended substantially
as the internet has been more widely used.
Changes:
Page 5 of 13
According to scope we have made changes that we are including shoes brand also. Where as
according to quality it matters we have shifted our website to amazon web services and its
cloud for better performance.
Project Issues:
The issues that arise is of the domain and hosting for this we have shifted our web to cloud
storage for better speed and performance.
Recommadations:
Inspiration for our ecommerce store and email marketing strategies to increase relevance and
revenue.
LESSONS LEARNED:
Summary:
Throughout the course of our endeavor, we learned a great deal. The good news is that we
have a variety of brands to choose from, all of which are successful in their respective fields.
However, we had a problem with delivery, which we were able to solve thanks to Trax's help.
Page 6 of 13
QUESTION # 3:
a) Draw the network diagram
1. A,B,C,D,K
2. A,E,F,G,K
3. A,H,I,J,K
Formula:
Total float = duration of the critical path – duration of the non-critical path
Activities on Paths Expected Duration Float
A, B,C, D, K 31 MONTHS We cant
calculate float of
critical path
A, E, F, G, K 26 MONTHS 31-26=5
A, H ,I ,J , K 15 MONTHS 31-15=16
Page 7 of 13
Question 04: Identify and classify the risks, to develop mobile applications now a days?
Is pandemic effect the development process and demand of mobile applications in terms
of,
For Roll numbers ending with 3-6 Choose Performance, Organizational Behaviour and
Risk Management Plan
Roll#276
Answer:
If there is something that can be done from your device, 'there's an app for that' - and a
risk.
The main reason why many companies are stepping in the app development business is
because of the increasing demands in high-quality applications. Companies hire mobile
app developers, buy mobile app testing software, and do their best to deliver the project
on time.
But still, in some cases, mobile app companies fail to create a well-secured user-friendly
app. Four important reasons why they fail are as follows:
Not using the latest trends of mobile app development such as chatbots, artificial
intelligence, IoT, machine learning, payment gateway integration, beacon
technology, blockchain integration, etc.
Not mapping mobile app ideas correctly as per available features.
Targeting the wrong audience while promoting a mobile app.
Falling for cheap mobile application development offers that reduce your budget
and impacts the app quality.
Page 8 of 13
Current development trends place mobile applications at the center. A client–server
architecture is used in the majority of these applications. The client is powered by the
operating system, which is usually Android or iOS. This is the interface through which the
user interacts whether making purchases, paying bills, or reading emails. There is, however, a
third component: the server, which is hosted by the developer. This function is frequently
performed by the same software that generates and processes the site's content. To put it
another way, the server-side component is typically a web application that communicates
with the mobile client via the Internet via an unique application programming interface (API).
As a result, we might consider the server to be the more crucial component.
Native mobile apps are downloaded and installed directly on the device through an app store
or market. I'm focusing on native apps because they're by far the most popular, but they also
come with their fair share of risks.So, what hidden risks should businesses be aware of before
embarking on mobile app development
In the various app shops, there are a variety of apps to choose from. As a result, there will
undoubtedly be many apps similar to yours.
However, in order for your app to stand out from the rest of the apps in the app store, you
must provide something distinct and distinctive in terms of functionality. Make sure you
aren't simply copying the functionality of another app when creating your own. It's not going
to help you gain any brownie points. Furthermore, you can always get inspiration from
comparable apps in your niche.
Awful UX/UI
An application's user experience and interface are essential. Users are more likely to engage
with apps that are user-friendly and provide a positive user experience; a decent interface
allows users to traverse your website with ease.
Financial risk
In the creation of any mobile software application, budgeting and cost estimation are critical.
Before taking over the project, the expected expenses and any charges that may be incurred in
the software manufacturing should be discussed with the clients.
The buffer amount is always valued because it reduces the possibility of financial crises at
various phases of the project.
Technical risk
A well-designed application is half the battle won. However, a poor application design wastes
a lot of time and money, and it's typically harmful in the long term. The following elements
are included in application design:
Page 9 of 13
• Algorithm: The algorithm for the application should be both cost and space efficient. The
application should not take up a lot of system memory.
Platform: The platform on which the program will run should be technically possible as well
as relatively reliable and secure. Android, iOS, and Windows are the most popular mobile
software application platforms.
Performance risk
A good application is one that can withstand security threats from the outside world. Running
unsecure mobile software has significant dangers that must be addressed immediately.
Different platforms, such as Android, iOS, RIM, and others, have their own methods for
detecting software vulnerabilities and dealing with external threats.
Maintiance risk
The work of a developer does not end with the release of an application on the market. The
most crucial aspect of a product's success is providing assistance after it has been released.
Platforms are updated on a regular basis, thus applications should adapt to these changes and
provide support for them.
Management risk
In this fast-paced, highly competitive software sector, the first mover always reaps additional
benefits. Every company wants to be the first to market with their product so that they can
easily attract clients and gain market share right away. Projects also have deadlines that must
be met. Because mobile platform updates are released often, mobile applications should be
updated at the same time to improve efficiency and make full use of platform features. Due to
time constraints, many scenarios are not explored, exposing software to instability and
security threats.
External risk
Many applications on the market have specific requirements that must be met in order for
them to function properly. Certain programs rely on GPS, while the majority of them require
access to the internet to function. In all types of environments, proper testing should be
carried out. If an application is internet-dependent, for example, we should test it on both
slow and fast connections to guarantee that it does not hang, crash, or cause any unintended
behavior in any case. We should also consider what would happen if the data connection
were to suddenly go down, as well as the amount of battery utilization under the
aforementioned scenarios.
Resource risks
Page 10 of 13
• Platform dependency: When an application is constructed, it is reliant on platform features
and should not compromise platform security. For example, certain functions are available on
one platform but not on another (for example, audio files cannot be shared on iOS but can be
on another platform). To avoid this, we should concentrate on building programs that isolate
the GUI from the core logic, so that we just have to alter the GUI section for multiple OSs
while the logic remains the same.
One of the most important realizations for the business to adopt mobile apps is that we're
playing in someone else's sandbox. we must follow their guidelines or risk having your
application rejected.
Risk of security:
Security flaws are nothing new, and they can affect any form of mobile app. The danger and
security here is in underestimating the importance of taking basic security precautions within
native programs.
Some businesses make the mistake of assuming that native apps are inherently safe and, as a
result, fail to take the necessary security precautions.
Is pandemic effect the development process and demand of mobile applications in terms
of
Performance
It’s important to ensure that any risk management plan encompasses user and partner
expectations on performance. Consideration must be given to benchmarks and
threshold testing throughout the project to ensure that the work products are moving
in the right direction in mobile application so that it should be capable of showing the
best performance of the application along with the features.
Organizational Behaviour
Page 11 of 13
on project outcomes. Project management must plan for efficient execution of the
project, and find a balance between the needs of the development team and the
expectations of the customers. Of course, adequate staffing includes choosing team
members with skill sets that are a good match with the project.
After cataloging all of the risks according to type, the mobile development
development project manager should craft a risk management plan. As part of a
larger, comprehensive project plan, the risk management plan outlines the response
that will be taken for each risk—if it materializes,mobile application There are some
requirements that depend on platform and development process and that are not
properly stated by the customer. They are highly vulnerable and if not taken into
consideration would lead to serious flaws when end product is released.
Solution:
CV=EV-AC
SV=EV-PV
SPI=EV/PV
CPI=EV/AC
Variance:
Cost Variance = EV-AC= 20,000-25,000
Page 12 of 13
= -5,000
Scheduled Variance= EV-PV =20,000-23,000
= -3,000
Efficiency:
Page 13 of 13