Oresund Bridge Project 1

In: Computers and Technology

Submitted By skyvice
Words 1038
Pages 5
Course project 1 contains my responses to the nine questions related to the Oresund Bridge project. I have answered them to the best of my ability.

1. What process would you use for identifying project risks for a second Oresund Bridge project? What risks would you raise for each alternative?
For such an extremely large project like this to identify project risks, I would start with the basic premise of a conducting a SWOT analysis which allows for identifying Strengths, Weaknesses, Opportunities, and Threats. Once SWOT analysis is completed, I would move forward to defining control of the project to indicate the following variances such as cost, schedule, scope and quality. Furthermore, bring in Subject Matter Experts (SME) to provide their input for mitigation strategy. Lastly, other risks to be raised for each alternative is to develop a risk management plan, project planning outputs, risk categories, historical information. By using these deliverables under the PMBOK risk processes called Risk identification.

2. What process would you use for categorizing project risks for a second Oresund Bridge project? How would you actually categorize them?
I would use the qualitative risk analysis process for categorizing project risks because from a high level standpoint it allows me to evaluate each risk and designate the severity of the impact of the project and estimate the probability of the risk occurring in terms of high, medium and low. For categorizing project risks, my goal would be to isolate potential problems, therefore would categorize by breaking up the risks into different constraints of scope, schedule, quality and resources into a risk matrix.

3. What process would you use for ranking project risks for a second Oresund Bridge project? How would you actually rank them?
Qualitative and Quantitative risk analysis can be used to rank project risks…...

Similar Documents

Project 1

...Project 1   Write an essay of 1500 words, giving credible references on the use of physics in your daily activities. You need to mention 5 or more activities where physics is used. Remember to follow the APA style and give references. Physics is used in so many ways that most people do not even realize that they are using it. Even a stay at home mom uses physics more than one would think. Daily activities that many people do include physics without thinking about it, such as driving a car, using a headrest in a car, walking and running, flushing the toilet, and washing and drying clothes. Driving a car has many different aspects of physics involved, but today only acceleration, speed, and velocity will be discussed. People talk in terms of physics everyday without even knowing that is what they are discussing. For example, “speed” limit, how quickly a car can “accelerate,” and when they add a direction, they are actually talking about the velocity of a vehicle because velocity has a magnitude and direction, not just magnitude. According to Barry Parker in Issac Newton School of Driving, “you are accelerating and decelerating most of the time when you take a trip through the busy streets of a city, either by stepping on the gas, braking, or turning the steering wheel.” Basically, if someone gets in the driver seat of a car and drives, that person is changing the acceleration, speed, and velocity of the car that is being driven. A speed is just the scalar, magnitude with......

Words: 1921 - Pages: 8

Project 1

...Course Project – Part I Introduction The Course Project is an opportunity for you to apply concepts learned to a real-life simulation experience. Throughout the Course Project, you will assume that you work as a financial analyst for AirJet Best Parts, Inc. The Course Project is provided in two parts as follows: Part I – In Part I, you work with AirJet Best Parts, Inc. staff to identify the best loan options, as well as to valuate stocks and bonds. Part II – In Part II, you will provide the company with a recommendation for purchasing a new machine. You will base your recommendation on the Net Present Value (NPV) of the capital investment project using the cost of capital (WACC) as your discount rate. About AirJet Best Parts, Inc. AirJet Best Parts, Inc. is a company dedicated to the design and manufacturing of aviation and airplane technologies and parts. The company has commercial and military clients worldwide. Task 1: Assessing loan options for AirJet Best Parts, Inc. The company needs to finance $8,000,000 for a new factory in Mexico. The funds will be obtained through a commercial loan and by issuing corporate bonds. Here is some of the information regarding the APRs offered by two well-known commercial banks.  1. Assuming that AirJet Parts, Inc. is considering loans from National First and Regions Best, what are the EARs for these two banks? Hint for National Bank: Go to the St. Louis Federal Reserve Board’s website (http://research.stlouisfed.org/fred2/)....

Words: 898 - Pages: 4

Project 1

...The Course Project is an opportunity for you to apply concepts learned to a real-life simulation experience. Throughout the Course Project, you will assume that you work as a financial analyst for AirJet Best Parts, Inc. The Course Project is provided in two parts as follows: Part I – In Part I, you work with AirJet Best Parts, Inc. staff to identify the best loan options, as well as to valuate stocks and bonds. Part II – In Part II, you will provide the company with a recommendation for purchasing a new machine. You will base your recommendation on the Net Present Value (NPV) of the capital investment project using the cost of capital (WACC) as your discount rate. About AirJet Best Parts, Inc. AirJet Best Parts, Inc. is a company dedicated to the design and manufacturing of aviation and airplane technologies and parts. The company has commercial and military clients worldwide. Task 1: Assessing loan options for AirJet Best Parts, Inc. The company needs to finance $8,000,000 for a new factory in Mexico. The funds will be obtained through a commercial loan and by issuing corporate bonds. Here is some of the information regarding the APRs offered by two well-known commercial banks. Bank APR Number of Times Compounded National First Prime Rate + 6.75% Semiannually Regions Best 13.17 Monthly 1. Assuming that AirJet Parts, Inc. is considering loans from National First and Regions Best, what are the EARs for these two banks? Hint for National Bank: Go to the St....

Words: 706 - Pages: 3

Project 1

...Chapter 1 — Business Combinations: America's Most Popular Business Activity, Bringing an End to the Controversy MULTIPLE CHOICE 1. An a. b. c. d. economic advantage of a business combination includes Utilizing duplicative assets. Creating separate management teams. Coordinated marketing campaigns. Horizontally combining levels within the marketing chain. C DIF: E OBJ: 1 ANS: 2. A tax advantage of business combination can occur when the existing owner of a company sells out and receives: a. cash to defer the taxable gain as a "tax-free reorganization." b. stock to defer the taxable gain as a "tax-free reorganization." c. cash to create a taxable gain. d. stock to create a taxable gain. ANS: B DIF: E OBJ: 1 3. A controlling interest in a company implies that the parent company a. owns all of the subsidiary's stock. b. has influence over a majority of the subsidiary's assets. c. has paid cash for a majority of the subsidiary's stock. d. has transferred common stock for a majority of the subsidiary's outstanding bonds and debentures. ANS: B DIF: M OBJ: 2 4. Which of the following is a potential abuse that may arise when a business combination is accounted for as a pooling of interests? a. Assets of the buyer may be overvalued when the price paid by the investor is allocated among specific assets. b. Earnings of the pooled entity may be increased because of the combination only and not as a result of efficient operations. c. Liabilities may be undervalued when the......

Words: 167618 - Pages: 671

Bleser Park Pedestrian Bridge Design Project

...Senior Design Project Submittal May 4 2012 Bleser Park Pedestrian Bridge The following is a 2011-2012 Senior Design Project report for the Fenn College of Engineering at Cleveland State University. Senior Design Project Submittal 2012 Table of Contents 1.0.0 Introduction........................................................................................................................................ 5 1.1.0 1.2.0 2.0.0 2.1.0 2.2.0 2.3.0 2.4.0 Objective .................................................................................................................................. 5 Group Members ...................................................................................................................... 5 Project Description ..................................................................................................................... 6 Assignment .............................................................................................................................. 6 Existing Bridge ........................................................................................................................ 7 Proposed Bridge ..................................................................................................................... 8 Owner Requirements ............................................................................................................. 9 2.4.1 Safety .....................................................

Words: 13525 - Pages: 55

Project 1

...Project Part 1: Multi-Layered Security Plan Loren Miller NT2580 Monday PM Introduction: Describe each layer of the Open System Interconnection (OSI) Model. List a security feature of each layer if it applies. List the protocol of each layer if it applies. List types of attacks that are you protecting against in each layer. Your goal is to be able to protect a web hosting company that has a global presence. This web hosting company supports customers in the following industries: Medical, Financial, and Governmental. Physical Layer: The Physical Layer defines the physical properties of the network, such as voltage levels, cable types, and interface pins (Baker). Any attack on the Physical Layer would have to be some type of physical action, like disrupting a power source, changing of interface pins, or cutting the actual cables. Simply tampering with someone’s fuse box outside their office can cause a disruption of service. Faulty power is a problem that can be caused accidentally by the power company, or intentionally by your competitor tampering with the fuse box. A smaller business may consider installing an Uninterrupted Power Supply (UPS) which may help avoid many unrecoverable power associated problems. The addition of a UPS to your critical system will give you time to perform an orderly shutdown when power is interrupted. An abrupt termination of power to any electrical equipment has potential for great damage. Much in the same way you might protect your......

Words: 1467 - Pages: 6

Project 1

...Project Alverenga Project Part 1 Task 1 The business needs; must comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA).   The business must comply with SOX, because the business is publicly-trading financial institution; PCI-DSS, because the business processes online credit card transactions; and GLBA, because the business is a financial institution.   All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad. All security requirements for SOX, PCI-DSS, and GLBA can be achieved using Linux and open source infrastructure.   Some examples of open source software that we might use are: Web Server - Apache     Web Filtering - DansGuardian           Network Firewall - Turtle Firewall     VPN - Endian Firewall Community         IDS/IPS - Suricata       Database - MySQL     File Server - Samba SMTP Server - hMailServer I would recommend that we use a "Defense in Depth" strategy, having multiple layers of access protection.   We need to have an IDS/IPS on both sides of our edge firewall.   The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks.   We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring.   Our web server and mail......

Words: 257 - Pages: 2

Project 1

...Project 1 Berkeley has a Mediterranean climate with discrete season both wet and dry. In the tardy spring and early fall, vigorous sea winds bring drought weather conditions including heat and dryness in these types of areas. In the spring, this is not customarily a quandary as vegetation is still moist from winter rains, but extreme dryness prevails by the fall. The warmest and driest months are typically June through September, with the highest temperatures occurring in September. Mid-summer which includes July and August is often marginally cooler due to the sea breezes and fog, which are mundanely most vigorously developed then (Western Regional Climate Center, 2014). Terre Haute has a mid-latitude continental climate. Rainfall in is fairly evenly distributed throughout the year. The wettest months in the year are May and June and the warmest month of the year is July with an average maximum temperature of 87.30 degrees Fahrenheit, while the coldest month of the year is January with an average minimum temperature of 17.70 degrees Fahrenheit. Potential evapo-transpiration is the amount of water that would be evaporated under an ideal set of conditions, among which is an unlimited supply of water. In other words, it would be the water needed for evaporation and transpiration given the local environmental conditions. One of the most paramount factors that determine water demand is solar radiation. As energy input increases the injunctive authorization for water, especially...

Words: 502 - Pages: 3

Project 1

...Essence of the New Testament: A Survey (2012). Module/Week | Reading & Study | Assignments | Points | 1 | Duvall & Hays: chs. 1–2Towns & Gutierrez: chs. 1–4Bible Readings1 presentation1 study guide | Course Requirements ChecklistClass IntroductionsDB Forum 1 Reading Report 1 | 10037.525 | 2 | Duvall & Hays: chs. 3–4Towns & Gutierrez: chs. 5–7Bible Readings1 presentation1 study guide | Reading Report 2Test 1 | 25125 | 3 | Duvall & Hays: chs. 5–6Towns & Gutierrez: chs. 8–9Bible Readings1 presentation1 study guide | Interpretation Project 1Reading Report 3 | 7525 | 4 | Duvall & Hays: chs. 7–8Towns & Gutierrez: chs. 10–13Bible Readings1 presentation1 study guide | Biblical Worldview Essay Reading Report 4Test 2 | 7525125 | 5 | Duvall & Hays: ch. 9Towns & Gutierrez: chs. 14–18Bible Readings1 presentation1 study guide | DB Forum 2Reading Report 5 | 37.525 | 6 | Duvall & Hays: ch. 10Towns & Gutierrez: chs. 19–22Bible Readings1 presentation1 study guide | Reading Report 6 Test 3 | 25125 | 7 | Towns & Gutierrez: chs. 23–26Bible Readings1 presentation1 study guide | Interpretation Project 2Reading Report 7 | 7525 | 8 | Towns & Gutierrez: chs. 27–31Bible Readings1 presentation1 study guide | Reading Report 8 Test 4 | 25125 | Total | 1010 | DB = Discussion Board NOTE: Each course week (except Module/Week 1) begins on Tuesday morning at 12:00 a.m. (ET) and ends on Monday night at 11:59 p.m. (ET). The......

Words: 250 - Pages: 1

Skop Oresund Bridge Project

...Oresund Bridge Project 1 Course project 1 contains my responses to the nine questions related to the Oresund Bridge project. I have answered them to the best of my ability. 1. What process would you use for identifying project risks for a second Oresund Bridge project? What risks would you raise for each alternative? For such an extremely large project like this to identify project risks, I would start with the basic premise of a conducting a SWOT analysis which allows for identifying Strengths, Weaknesses, Opportunities, and Threats. Once SWOT analysis is completed, I would move forward to defining control of the project to indicate the following variances such as cost, schedule, scope and quality. Furthermore, bring in Subject Matter Experts (SME) to provide their input for mitigation strategy. Lastly, other risks to be raised for each alternative is to develop a risk management plan, project planning outputs, risk categories, historical information. By using these deliverables under the PMBOK risk processes called Risk identification. 2. What process would you use for categorizing project risks for a second Oresund Bridge project? How would you actually categorize them? I would use the qualitative risk analysis process for categorizing project risks because from a high level standpoint it allows me to evaluate each risk and designate the severity of the impact of the project and estimate the probability of the risk occurring in terms of high, medium and low....

Words: 320 - Pages: 2

Project 1

...Case Study 1: The Curious Case of Gary McKinnon By Aicha Doudou CCJS 390 Professor Daniel Draz University of Maryland University College Gary McKinnon was a Scottish hacker who hacks into NASA computers to search for evidence of aliens and extraterrestrial technology. He believes the NASA and other US government were hiding something from the public and that they had classified documents about Unidentified Flying Objects (UFOs). It all started in 2000 when he decided to look for UFO evidence on the U.S. government's computer systems. He began obsessively researching ways to break into the machines. Using the Perl programming language, he wrote a small script that he says allowed him to scan up to 65 000 machines for passwords in under 8 minutes. After dialing up the government systems, he ran the code and made an astonishing discovery: Many federal workers failed to change the default passwords on their computers. On these unsecure machines, McKinnon installed a software program called Remotely Anywhere, which allows remote access and control of computers over the Internet. McKinnon could then browse through the machines at his leisure and transfer or delete files. Because he was able to monitor all activity on the computers, he could log off the moment he saw anyone else logging on. It is claimed that between February 2001 and March 2002, Gary McKinnon hacked into dozens of US army, navy, air force, and Department of Defense computers, as well as 16 NASA computers...

Words: 1239 - Pages: 5

Project 1

...Project One Revised 1 December 2014 Articles to be added to Second Edition of The Ethical Citizen There it is. The four-hour flight is ready to emerge into the open air. Everything has gone smoothly, and then it comes around the corner slowly wobbling down the aisle. Eyes frantically look around to see if there is an open seat other then the one next to them. Panic sets in. The phrase, “please don’t sit by me.” is silently thought amongst everyone nearby. Then it happens. The oversized man plops his body right next to the unsuspecting passenger. It happens all the time…people judge another person by how they look before knowing a single thing about them. Does that make them a bad person? Ethics would argue yes. But what makes a person ethical? Everyone has his or her own idea of what makes someone an ethical citizen. For the second edition of The Ethical Citizen, three main components of what makes someone ethical should be incorporated into the book. These things include; responsibility, selflessness, and helping those in need. Responsibility is something that humans in today’s world strive for; in many instances responsibility can be an instinct. In Kathleen Toner’s “Taking Out the Rivers' Trash, One Piece at a Time” Chad Pregracke devotes his life to removing trash from the Mississippi River and other waterways across America. Pregracke has removed 67,000 tires, 218 washing machines, 19 tractors, 12 hot tubs, four pianos and almost 1,000 refrigerators from various......

Words: 1283 - Pages: 6

Project 1

...The Security Analysis Project What is this project? This project provides an opportunity to get some hands-on experience applying investment theory and models to real firms. In the process, participants will get a chance to: evaluate the risk profile of a firm and examine the sources of risk; analyze its capital structure and decide whether the firm is under- or over-leveraged; examine its dividend policy and decide whether the firm is under- or over-leveraged; and value the firm. How is the project structured? This is a project requiring by individual analysis and group synthesis. Each group should have at least 5 members but not to exceed 7. Each group will pick an industry to study. Each group member will pick a firm within this chosen industry to analyze. The companies chosen does not imply that they be competitors. For instance, a group can pick a company that manufactures personal computers, a company that produces software, and a company that provides computer services as part of the same group. Each person will be responsible for doing the entire analysis for the company that he or she has chosen. At the end of the process, the group will write one integrated report for all the firms in the group. In this report, the firms will be compared and contrasted and the results will be presented as a whole rather than as five separate parts. How will the project be graded? Each group will be graded on the final project and all of the presentations......

Words: 7847 - Pages: 32

Project 1

...Information Systems Security IT 255 Lionel F. Chatel III Project 1 9/19/2011 ISS Project 1 1. User domain: * Made up of typical IT users and the hardware, software, and data they use. The user domain is the weakest link in an IT infrastructure. Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss during performance reviews. 2. Workstation domain: * Roles, tasks, responsibilities and accountability come into play in the workstation domain. Enabling password protection on workstation for access. Enable auto screen lockout for inactive times. 3. LAN domain: * Small network organized by function or department, allowing access to all resources on the LANs. Using NIC cards, Ethernet LAN, LAN switch, UTP cabling are just some ways in connecting to a network. Implementing LAN server and configuration standards procedures and guideline can help a lot in security. 4. LAN-to-WAN domain: * The point at which the IT infrastructure joins a WAN and the Internet.LAN to WAN use different protocols for data transfer. Some are HTTP, FTP, TFTP, Telnet and SSH. A complete list of well know ports numbers from 0 to 1023 is maintained by IANA. Applying file transfer monitoring, scanning and alarming for unknown file types from unknown sources would be a form of security. 5. WAN domain: * The point at which the WAN connects to other WANs via the Internet. What goes on with the......

Words: 366 - Pages: 2

Project 1

...Marshall Law 11 March 2016 Project #1: To Kill a Mockingbird (1962) Music in films before 1970 had a distinct purpose. In the film “To Kill a Mockingbird” the music highlights important material in the film. This music was utilized to enhance the emotion of the film. The musical score was under the direction of Elmer Bernstein, an outstanding musician responsible for many major film scores. This film was produced in 1962, just about the time where avant-garde music was well in effect. Elmer Bernstein implements these new techniques of dissonant harmonious, wide intervals and complex rhythms in his themes throughout the film. There are three points where he utilizes music in this film. He highlights characters, highlights transitions and highlights emotional scenes. Music is not played from beginning to end, as the music is accents key moments. There is no use of source music in this film, allowing all the music to be underscore. To Kill a Mockingbird (1962) is based off of the popular novel with the same name. The film follows the endeavors of two children, Scout and Jem, as well as their father, Atticus. Circulating the time of the Great Depression, this film emphasizes racial inequality. As the film develops, the plot reveals an important case dealing with the allegations of an African American man raping a white women. Tom Robinson, the man accused, is found guilty by the jury, only to suicide by cop. The man responsible for the allegations attacks Scout and Jem...

Words: 1030 - Pages: 5

Winnie Mzembe | Екатерина Климова | Emjay Anthony