Task A. High level analysis 3. Selection of server hosting C. Configuration of server D. Detailed analysis of core modules E. Detailed analysis of supporting modules Length 1 week 1 day 2 weeks 2 weeks 2 weeks Type* S S S S, P to B, C S, P to F Dependent on... A B A D

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter4: Information Security Policy
Section: Chapter Questions
Problem 17RQ
icon
Related questions
Question
100%
PERT Chart
Task
A. High level analysis
B. Selection of server hosting
C. Configuration of server
D. Detailed analysis of core modules
E. Detailed analysis of supporting modules
F. Development of core modules
G. Development of supporting modules
H. Quality assurance of core modules
1. Quality assurance of supporting modules
J. Initial client internal training
K. Development and QA of accounting reporting
L. Development and QA of management reporting
M. Development of Management Information
System
N. Client internal user training
*P: Parallel, S: Sequential
Length
1 week
1 day
2 weeks
2 weeks
2 weeks
3 weeks
3 weeks
1 week
1 week
1 day
1 week
1 week
1 week
1 week
Type*
S
S
S
S, P to B, C
S, P to F
S, P to E
S, P to H, J
S, P to G
S
S, P to G
S
S
S
S
Use the table to:
1. identify the critical Path of the project?
2. Calculate the planned duration of the project (in week)
3. Identify any non-critical tasks and the float (free slack) on each (
Dependent
on...
A
B
A
D
D
E
F
G
C,H
E
E
L
I, J, K, M
Transcribed Image Text:PERT Chart Task A. High level analysis B. Selection of server hosting C. Configuration of server D. Detailed analysis of core modules E. Detailed analysis of supporting modules F. Development of core modules G. Development of supporting modules H. Quality assurance of core modules 1. Quality assurance of supporting modules J. Initial client internal training K. Development and QA of accounting reporting L. Development and QA of management reporting M. Development of Management Information System N. Client internal user training *P: Parallel, S: Sequential Length 1 week 1 day 2 weeks 2 weeks 2 weeks 3 weeks 3 weeks 1 week 1 week 1 day 1 week 1 week 1 week 1 week Type* S S S S, P to B, C S, P to F S, P to E S, P to H, J S, P to G S S, P to G S S S S Use the table to: 1. identify the critical Path of the project? 2. Calculate the planned duration of the project (in week) 3. Identify any non-critical tasks and the float (free slack) on each ( Dependent on... A B A D D E F G C,H E E L I, J, K, M
Expert Solution
steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Fundamentals of managing system
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,