Premium Essay

Oresund Bridge Project 1

In: Computers and Technology

Submitted By skyvice
Words 1038
Pages 5
Course project 1 contains my responses to the nine questions related to the Oresund Bridge project. I have answered them to the best of my ability.

1. What process would you use for identifying project risks for a second Oresund Bridge project? What risks would you raise for each alternative?
For such an extremely large project like this to identify project risks, I would start with the basic premise of a conducting a SWOT analysis which allows for identifying Strengths, Weaknesses, Opportunities, and Threats. Once SWOT analysis is completed, I would move forward to defining control of the project to indicate the following variances such as cost, schedule, scope and quality. Furthermore, bring in Subject Matter Experts (SME) to provide their input for mitigation strategy. Lastly, other risks to be raised for each alternative is to develop a risk management plan, project planning outputs, risk categories, historical information. By using these deliverables under the PMBOK risk processes called Risk identification.

2. What process would you use for categorizing project risks for a second Oresund Bridge project? How would you actually categorize them?
I would use the qualitative risk analysis process for categorizing project risks because from a high level standpoint it allows me to evaluate each risk and designate the severity of the impact of the project and estimate the probability of the risk occurring in terms of high, medium and low. For categorizing project risks, my goal would be to isolate potential problems, therefore would categorize by breaking up the risks into different constraints of scope, schedule, quality and resources into a risk matrix.

3. What process would you use for ranking project risks for a second Oresund Bridge project? How would you actually rank them?
Qualitative and Quantitative risk analysis can be used to rank project risks…...

Similar Documents

Premium Essay

Project 1

...Project 1   Write an essay of 1500 words, giving credible references on the use of physics in your daily activities. You need to mention 5 or more activities where physics is used. Remember to follow the APA style and give references. Physics is used in so many ways that most people do not even realize that they are using it. Even a stay at home mom uses physics more than one would think. Daily activities that many people do include physics without thinking about it, such as driving a car, using a headrest in a car, walking and running, flushing the toilet, and washing and drying clothes. Driving a car has many different aspects of physics involved, but today only acceleration, speed, and velocity will be discussed. People talk in terms of physics everyday without even knowing that is what they are discussing. For example, “speed” limit, how quickly a car can “accelerate,” and when they add a direction, they are actually talking about the velocity of a vehicle because velocity has a magnitude and direction, not just magnitude. According to Barry Parker in Issac Newton School of Driving, “you are accelerating and decelerating most of the time when you take a trip through the busy streets of a city, either by stepping on the gas, braking, or turning the steering wheel.” Basically, if someone gets in the driver seat of a car and drives, that person is changing the acceleration, speed, and velocity of the car that is being driven. A speed is just the scalar, magnitude with......

Words: 1921 - Pages: 8

Premium Essay

Project 1

...Chapter 1 — Business Combinations: America's Most Popular Business Activity, Bringing an End to the Controversy MULTIPLE CHOICE 1. An a. b. c. d. economic advantage of a business combination includes Utilizing duplicative assets. Creating separate management teams. Coordinated marketing campaigns. Horizontally combining levels within the marketing chain. C DIF: E OBJ: 1 ANS: 2. A tax advantage of business combination can occur when the existing owner of a company sells out and receives: a. cash to defer the taxable gain as a "tax-free reorganization." b. stock to defer the taxable gain as a "tax-free reorganization." c. cash to create a taxable gain. d. stock to create a taxable gain. ANS: B DIF: E OBJ: 1 3. A controlling interest in a company implies that the parent company a. owns all of the subsidiary's stock. b. has influence over a majority of the subsidiary's assets. c. has paid cash for a majority of the subsidiary's stock. d. has transferred common stock for a majority of the subsidiary's outstanding bonds and debentures. ANS: B DIF: M OBJ: 2 4. Which of the following is a potential abuse that may arise when a business combination is accounted for as a pooling of interests? a. Assets of the buyer may be overvalued when the price paid by the investor is allocated among specific assets. b. Earnings of the pooled entity may be increased because of the combination only and not as a result of efficient operations. c. Liabilities may be undervalued when the......

Words: 167618 - Pages: 671

Free Essay

Bleser Park Pedestrian Bridge Design Project

...Senior Design Project Submittal May 4 2012 Bleser Park Pedestrian Bridge The following is a 2011-2012 Senior Design Project report for the Fenn College of Engineering at Cleveland State University. Senior Design Project Submittal 2012 Table of Contents 1.0.0 Introduction........................................................................................................................................ 5 1.1.0 1.2.0 2.0.0 2.1.0 2.2.0 2.3.0 2.4.0 Objective .................................................................................................................................. 5 Group Members ...................................................................................................................... 5 Project Description ..................................................................................................................... 6 Assignment .............................................................................................................................. 6 Existing Bridge ........................................................................................................................ 7 Proposed Bridge ..................................................................................................................... 8 Owner Requirements ............................................................................................................. 9 2.4.1 Safety .....................................................

Words: 13525 - Pages: 55

Premium Essay

Project 1

...Project Part 1: Multi-Layered Security Plan Loren Miller NT2580 Monday PM Introduction: Describe each layer of the Open System Interconnection (OSI) Model. List a security feature of each layer if it applies. List the protocol of each layer if it applies. List types of attacks that are you protecting against in each layer. Your goal is to be able to protect a web hosting company that has a global presence. This web hosting company supports customers in the following industries: Medical, Financial, and Governmental. Physical Layer: The Physical Layer defines the physical properties of the network, such as voltage levels, cable types, and interface pins (Baker). Any attack on the Physical Layer would have to be some type of physical action, like disrupting a power source, changing of interface pins, or cutting the actual cables. Simply tampering with someone’s fuse box outside their office can cause a disruption of service. Faulty power is a problem that can be caused accidentally by the power company, or intentionally by your competitor tampering with the fuse box. A smaller business may consider installing an Uninterrupted Power Supply (UPS) which may help avoid many unrecoverable power associated problems. The addition of a UPS to your critical system will give you time to perform an orderly shutdown when power is interrupted. An abrupt termination of power to any electrical equipment has potential for great damage. Much in the same way you might protect your......

Words: 1467 - Pages: 6

Premium Essay

Project 1

...Project 1 Berkeley has a Mediterranean climate with discrete season both wet and dry. In the tardy spring and early fall, vigorous sea winds bring drought weather conditions including heat and dryness in these types of areas. In the spring, this is not customarily a quandary as vegetation is still moist from winter rains, but extreme dryness prevails by the fall. The warmest and driest months are typically June through September, with the highest temperatures occurring in September. Mid-summer which includes July and August is often marginally cooler due to the sea breezes and fog, which are mundanely most vigorously developed then (Western Regional Climate Center, 2014). Terre Haute has a mid-latitude continental climate. Rainfall in is fairly evenly distributed throughout the year. The wettest months in the year are May and June and the warmest month of the year is July with an average maximum temperature of 87.30 degrees Fahrenheit, while the coldest month of the year is January with an average minimum temperature of 17.70 degrees Fahrenheit. Potential evapo-transpiration is the amount of water that would be evaporated under an ideal set of conditions, among which is an unlimited supply of water. In other words, it would be the water needed for evaporation and transpiration given the local environmental conditions. One of the most paramount factors that determine water demand is solar radiation. As energy input increases the injunctive authorization for water, especially...

Words: 502 - Pages: 3

Free Essay

Project 1

...Essence of the New Testament: A Survey (2012). Module/Week | Reading & Study | Assignments | Points | 1 | Duvall & Hays: chs. 1–2Towns & Gutierrez: chs. 1–4Bible Readings1 presentation1 study guide | Course Requirements ChecklistClass IntroductionsDB Forum 1 Reading Report 1 | 10037.525 | 2 | Duvall & Hays: chs. 3–4Towns & Gutierrez: chs. 5–7Bible Readings1 presentation1 study guide | Reading Report 2Test 1 | 25125 | 3 | Duvall & Hays: chs. 5–6Towns & Gutierrez: chs. 8–9Bible Readings1 presentation1 study guide | Interpretation Project 1Reading Report 3 | 7525 | 4 | Duvall & Hays: chs. 7–8Towns & Gutierrez: chs. 10–13Bible Readings1 presentation1 study guide | Biblical Worldview Essay Reading Report 4Test 2 | 7525125 | 5 | Duvall & Hays: ch. 9Towns & Gutierrez: chs. 14–18Bible Readings1 presentation1 study guide | DB Forum 2Reading Report 5 | 37.525 | 6 | Duvall & Hays: ch. 10Towns & Gutierrez: chs. 19–22Bible Readings1 presentation1 study guide | Reading Report 6 Test 3 | 25125 | 7 | Towns & Gutierrez: chs. 23–26Bible Readings1 presentation1 study guide | Interpretation Project 2Reading Report 7 | 7525 | 8 | Towns & Gutierrez: chs. 27–31Bible Readings1 presentation1 study guide | Reading Report 8 Test 4 | 25125 | Total | 1010 | DB = Discussion Board NOTE: Each course week (except Module/Week 1) begins on Tuesday morning at 12:00 a.m. (ET) and ends on Monday night at 11:59 p.m. (ET). The......

Words: 250 - Pages: 1

Premium Essay

Skop Oresund Bridge Project

...Oresund Bridge Project 1 Course project 1 contains my responses to the nine questions related to the Oresund Bridge project. I have answered them to the best of my ability. 1. What process would you use for identifying project risks for a second Oresund Bridge project? What risks would you raise for each alternative? For such an extremely large project like this to identify project risks, I would start with the basic premise of a conducting a SWOT analysis which allows for identifying Strengths, Weaknesses, Opportunities, and Threats. Once SWOT analysis is completed, I would move forward to defining control of the project to indicate the following variances such as cost, schedule, scope and quality. Furthermore, bring in Subject Matter Experts (SME) to provide their input for mitigation strategy. Lastly, other risks to be raised for each alternative is to develop a risk management plan, project planning outputs, risk categories, historical information. By using these deliverables under the PMBOK risk processes called Risk identification. 2. What process would you use for categorizing project risks for a second Oresund Bridge project? How would you actually categorize them? I would use the qualitative risk analysis process for categorizing project risks because from a high level standpoint it allows me to evaluate each risk and designate the severity of the impact of the project and estimate the probability of the risk occurring in terms of high, medium and low....

Words: 320 - Pages: 2

Free Essay

Project 1

...Case Study 1: The Curious Case of Gary McKinnon By Aicha Doudou CCJS 390 Professor Daniel Draz University of Maryland University College Gary McKinnon was a Scottish hacker who hacks into NASA computers to search for evidence of aliens and extraterrestrial technology. He believes the NASA and other US government were hiding something from the public and that they had classified documents about Unidentified Flying Objects (UFOs). It all started in 2000 when he decided to look for UFO evidence on the U.S. government's computer systems. He began obsessively researching ways to break into the machines. Using the Perl programming language, he wrote a small script that he says allowed him to scan up to 65 000 machines for passwords in under 8 minutes. After dialing up the government systems, he ran the code and made an astonishing discovery: Many federal workers failed to change the default passwords on their computers. On these unsecure machines, McKinnon installed a software program called Remotely Anywhere, which allows remote access and control of computers over the Internet. McKinnon could then browse through the machines at his leisure and transfer or delete files. Because he was able to monitor all activity on the computers, he could log off the moment he saw anyone else logging on. It is claimed that between February 2001 and March 2002, Gary McKinnon hacked into dozens of US army, navy, air force, and Department of Defense computers, as well as 16 NASA computers...

Words: 1239 - Pages: 5

Premium Essay

Project 1

... Nonlapan Burimsittichai Ungkana Lukkanavej Econ545: Project 1 – Microeconomic Analysis January, 26, 2015 Introduction In the previous years we have been experiencing a shortage on the supply of physicians, issue that according to the projections will not be changing any time soon. Given this situation we could probably already answer the question and risk to say that it is a good idea economy-wise to become a doctor, seeing that at least for the next 10 years the supply will not be anywhere close to satisfy the demand. There’s many factors that affect this increase in demand such as aging of population, the Baby Boomers that want to remain active and look for and use more healthcare as well as the next generations after them. It is also important to mention that an increase on productivity of healthcare could reduce the gap between demand of supply, but after many years and different attempts almost nothing has been achieved, since healthcare has become more and more complex. Here is a little extract from AAMC website talking about the issue of physicians shortage of supply: The number of federally funded residency training positions was capped by Congress in 1997 by the Balanced Budget Act. The 26,000 residency positions available for first year trainees will not be enough to provide training for the students graduating from medical school as early as 2016. In addition, Medicare support of graduate medical education (GME) includes paying its share of the costs of......

Words: 2959 - Pages: 12

Free Essay

Project 1

...Project One Revised 1 December 2014 Articles to be added to Second Edition of The Ethical Citizen There it is. The four-hour flight is ready to emerge into the open air. Everything has gone smoothly, and then it comes around the corner slowly wobbling down the aisle. Eyes frantically look around to see if there is an open seat other then the one next to them. Panic sets in. The phrase, “please don’t sit by me.” is silently thought amongst everyone nearby. Then it happens. The oversized man plops his body right next to the unsuspecting passenger. It happens all the time…people judge another person by how they look before knowing a single thing about them. Does that make them a bad person? Ethics would argue yes. But what makes a person ethical? Everyone has his or her own idea of what makes someone an ethical citizen. For the second edition of The Ethical Citizen, three main components of what makes someone ethical should be incorporated into the book. These things include; responsibility, selflessness, and helping those in need. Responsibility is something that humans in today’s world strive for; in many instances responsibility can be an instinct. In Kathleen Toner’s “Taking Out the Rivers' Trash, One Piece at a Time” Chad Pregracke devotes his life to removing trash from the Mississippi River and other waterways across America. Pregracke has removed 67,000 tires, 218 washing machines, 19 tractors, 12 hot tubs, four pianos and almost 1,000 refrigerators from various......

Words: 1283 - Pages: 6

Premium Essay

Project 1

...The Security Analysis Project What is this project? This project provides an opportunity to get some hands-on experience applying investment theory and models to real firms. In the process, participants will get a chance to: evaluate the risk profile of a firm and examine the sources of risk; analyze its capital structure and decide whether the firm is under- or over-leveraged; examine its dividend policy and decide whether the firm is under- or over-leveraged; and value the firm. How is the project structured? This is a project requiring by individual analysis and group synthesis. Each group should have at least 5 members but not to exceed 7. Each group will pick an industry to study. Each group member will pick a firm within this chosen industry to analyze. The companies chosen does not imply that they be competitors. For instance, a group can pick a company that manufactures personal computers, a company that produces software, and a company that provides computer services as part of the same group. Each person will be responsible for doing the entire analysis for the company that he or she has chosen. At the end of the process, the group will write one integrated report for all the firms in the group. In this report, the firms will be compared and contrasted and the results will be presented as a whole rather than as five separate parts. How will the project be graded? Each group will be graded on the final project and all of the presentations......

Words: 7847 - Pages: 32

Premium Essay

Project 1

...that is incorrectly formatted. Please save a copy of this document. Replace the generic information with your personal information, and use this file as a template for your own work. Filenames All composition classes focus on writing process, so each part of the process must be saved; all drafts, revisions, and edits must be saved to document the process. Therefore, naming and organizing your files is important to your success. Each time you revise or edit a file, save the file with a new filename. Do not just overwrite the existing file. Use the following method to name files: lastname assignment number (for example, if your last name is Smith and you are working on Week 2, Session 1, Assignment C, use the filename Smith 2-1-C. Some assignments ask you to specifically label a draft (e.g., Revision 1 or Revision 2). Please carefully follow instructions so your assignments will be clearly identifiable, to both you and your instructor. Please note the important elements of MLA format: • Appropriate font and font size • One-inch margins on all sides of the page • Four-line heading that appears only on page one • Pagination on each page, placed in the header in the upper right corner of the page. Pagination is the only thing that is placed in the header. • Title • Double spacing throughout the entire paper with no added space between any lines in the paper. Microsoft Word (.doc or .docx format) must be used for all......

Words: 1410 - Pages: 6

Premium Essay

Project 1

...Information Systems Security IT 255 Lionel F. Chatel III Project 1 9/19/2011 ISS Project 1 1. User domain: * Made up of typical IT users and the hardware, software, and data they use. The user domain is the weakest link in an IT infrastructure. Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss during performance reviews. 2. Workstation domain: * Roles, tasks, responsibilities and accountability come into play in the workstation domain. Enabling password protection on workstation for access. Enable auto screen lockout for inactive times. 3. LAN domain: * Small network organized by function or department, allowing access to all resources on the LANs. Using NIC cards, Ethernet LAN, LAN switch, UTP cabling are just some ways in connecting to a network. Implementing LAN server and configuration standards procedures and guideline can help a lot in security. 4. LAN-to-WAN domain: * The point at which the IT infrastructure joins a WAN and the Internet.LAN to WAN use different protocols for data transfer. Some are HTTP, FTP, TFTP, Telnet and SSH. A complete list of well know ports numbers from 0 to 1023 is maintained by IANA. Applying file transfer monitoring, scanning and alarming for unknown file types from unknown sources would be a form of security. 5. WAN domain: * The point at which the WAN connects to other WANs via the Internet. What goes on with the......

Words: 366 - Pages: 2

Free Essay

Project 1

...Marshall Law 11 March 2016 Project #1: To Kill a Mockingbird (1962) Music in films before 1970 had a distinct purpose. In the film “To Kill a Mockingbird” the music highlights important material in the film. This music was utilized to enhance the emotion of the film. The musical score was under the direction of Elmer Bernstein, an outstanding musician responsible for many major film scores. This film was produced in 1962, just about the time where avant-garde music was well in effect. Elmer Bernstein implements these new techniques of dissonant harmonious, wide intervals and complex rhythms in his themes throughout the film. There are three points where he utilizes music in this film. He highlights characters, highlights transitions and highlights emotional scenes. Music is not played from beginning to end, as the music is accents key moments. There is no use of source music in this film, allowing all the music to be underscore. To Kill a Mockingbird (1962) is based off of the popular novel with the same name. The film follows the endeavors of two children, Scout and Jem, as well as their father, Atticus. Circulating the time of the Great Depression, this film emphasizes racial inequality. As the film develops, the plot reveals an important case dealing with the allegations of an African American man raping a white women. Tom Robinson, the man accused, is found guilty by the jury, only to suicide by cop. The man responsible for the allegations attacks Scout and Jem...

Words: 1030 - Pages: 5

Free Essay

Project 1

...|Project |IEEE 802.16 Broadband Wireless Access Working Group | |Title |Nonce based TEK Update for Handover | |Date Submitted |2008-01-21 | |Source(s) |Stavros Tzavidas |Voice: +1-847-632-4313 | | | |E-mail: stavros.tzavidas@motorola.com | | |Motorola Inc. | | | | | | | |1501 W. Shure Dr. | | | |Arlington Heights IL 60004 | | | | ...

Words: 4252 - Pages: 18