Define a WBS to describe the deliverables expected for Compute.Access.SeeLock. To normalize the work done, your WBS will be created using the following guidelines: 1. High Level deliverables should be Hardware, Software and Procedures 2. There should be three levels in the WBS (note not all deliverables may need three levels) 3.The number of work packages should be between 10 and 15

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Review the project charter below for a brief description of project Compute.Access.SeeLock and answer the questions presented after. (This is a non-graded assignment)

CHARTER BEGINS.....

Version 1.0
Distribution: Restricted to Sponsor and Project Team
The SeeLock module of Compute.Access is a project that has the objective of reducing the possibility of unrestricted access to offices. The basic idea is to use the barcode on staff and students’ identification cards along with face recognition techniques to determine if an individual that intends to enter an office is authorized. The motivation behind the project includes reducing recurrent costs, as well as increasing functionality. Purchasing an existing option off the market would expose the university to a cost of approximately $100 million over a period of 10 years. As a result, the Principal has decided to approve a project to develop a prototype with a preliminary estimated budget of $5 million. The additional required functionality allows cross referencing a picture of an individual aiming to enter an area with the ID presented, as well as allowing an authorized person to indicate whether there is duress. If a duress signal (to be determined) is detected, control of the door is passed directly to a security unit, along with a video feed of the door area. It is assumed that the items listed in appendix A can be outsourced. On demand reports of user accesses should be available.
The prototype is to be installed at the main Computing office on the third floor, however full documentation of the procedures used to create the product is expected to allow easy replication to other locations. It is important that the system be completed and tested at a point in time when traffic is low, and as such the system needs to be completed by December 2023 to allow testing in the first week of January 2024.

Charter Approvals

Project Manager..............................................................Date.....................................................

Sponsor .......................................................................Date.....................................................

Network Manager ...........................................................Date.....................................................

Chief of Security..............................................................Date.....................................................

Appendix A.

Purchase Magnetic Lock. (Duration 5 days; Cost $100,000)
Purchase Camera and Network Storage Device. (Duration 2 days, Cost $150,000)
Install a Network Connection. (Your solution may include several) (Duration 5 days, Cost $40,000)

Question 1

Define a WBS to describe the deliverables expected for Compute.Access.SeeLock. To normalize the work done, your WBS will be created using the following guidelines:

1. High Level deliverables should be Hardware, Software and Procedures
2. There should be three levels in the WBS (note not all deliverables may need three levels) 3.The number of work packages should be between 10 and 15

Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Requirement Gathering
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education