Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

IT Project Management

The instructions for the assignment are in the attached folder.

Work Breakdown Structure for a Wedding
(Individual project)

WBS for a Wedding Spring 2024 Page 1 of 2

Overview

The purpose of this Individual assignment is to develop a WBS (Work Breakdown Structure). NOTE: You
will need Microsoft Project for this assignment. Since this will be an introduction to Microsoft Project,
the scope of the WBS is relatively small.

Assignment for the Wedding WBS

The scenario is this – Your best friend asked you to help plan a wedding in another city. You have no
concern for schedule or budget at the moment, only defining the work that needs to be done for the
wedding to start on time and to be successful. There will be up to 100 guests.

As there are different ways to organize a WBS, you should choose one of the patterns below. This WBS
can be organized by functions or by physical locations, choose just one. Of course, there are other
patterns that could be used but these look like logical choices for this project.

WBS Organized by Location WBS Organized by Function

Outline
Level WBS Element

Outline
Level WBS Element

0 The wedding project 0 The wedding project

1 Airport arrangements 1 Event programming

1 Guest hotels 1 Guest arrangements

1 Church arrangements 1 Catering

1 Reception arrangements 1 Musical entertainment

1 Wedding outfits 1 Floral displays

1 Going away outfits 1 Wedding outfitting

1 Honeymoon arrangements 1 Transportation

Things to remember:

• First, change the MS-Project default configuration settings, see the Project Configuration
Settings section in “Project Tutorials” (Course Resources → Microsoft Project).

• Don’t go overboard on details, i.e., do not go deeper than Outline Level 3.

• Even though this is a small project, make sure you have enough details, i.e., enough sub-tasks to
show how you will complete the Summary Task deliverable.

• Do indent sub-tasks, see the Adding Tasks to the Schedule section in “Project Tutorials” (Course
Resources → Microsoft Project).

• Show the WBS column, see Show the Project WBS Numbers section in “Project Tutorials”
(Course Resources → Microsoft Project).

Work Breakdown Structure for a Wedding
(Individual project)

WBS for a Wedding Spring 2024 Page 2 of 2

• Follow task naming conventions, see the Week 1 Readings, “How to Build Work Breakdown
Structures”, and “What NOT to do in a WBS”.

o A sub-task should be named using verb, adjective and noun – there is action performed.

o A Summary task should be named using noun / adjective structure (NO VERBS) – it
describes what will be delivered instead of what work will be done.

• No blank rows, i.e.,

• Summary tasks and sub-tasks should address only one (not multiple) deliverable (or action).

• Never use full sentences in the Task Name column of the schedule.

IMPORTANT: Submit this file named as “[LastnameFirstname] [Deliverable] Week 1”
EXAMPLE: RowleyGarrett WBS Week 1

IMPORTANT – Use Your Name, but no Special Characters in the File Name

Grading Rubric

Criteria
90-100%

Far Above Standards

80-89%

Above Standards

70-79%

Meets Standards

60-69%

Below Standards

< 60%

Well Below Standards

Possible
Points

Configuration Settings

Needed for producing
consistent results in the
project schedule

12 Points

All configuration settings
correct

10.7 Points

Missed 1-2 configuration
settings

9.5 Points

Missed 3-4 configuration
settings

8.3 Points

Missed 4-5 configuration
settings

7.1 Points

Missed 5 or more
configuration settings

12

WBS Structure

Includes appropriate level of
decomposition, uses
Project’s WBS numbering,
requires indenting sub-tasks,
and continuous rows

12 Points

Correctly decomposed the
schedule to Outline Level 3;
Did not leave blank rows in
the schedule; Did not
manually enter WBS numbers

10.7 Points

Decomposed too little (to
Outline Level 2), or too much
(to Outline Level 4)

9.5 Points

Over-decomposition (to
Outline Level 5)

8.3 Points

Far too much decomposition,
beyond Outline Level 5

7.1 Points

No decomposition at all,
stopped at Outline Level 1;
Left blank rows in the
schedule; Manually entered
WBS numbers

12

Summary Tasks

Uses a specific naming
convention, refers to a single
deliverable, does not read like
a sentence

18 Points

All Summary Tasks follow the
correct naming structure;
Summary Tasks do not use
full sentences in the Task
Name column; Summary
Tasks do not encompass
multiple deliverables

16 Points

At least two sources are 1-2
Summary Tasks do not follow
correct naming structure; 1-2
Summary Tasks use full
sentences in the Task Name
column; 1-2 Summary Tasks
encompass multiple
deliverables (should only be
one)

14.2 Points

3-4 Summary Tasks do not
follow correct naming
structure; 3-4 Summary
Tasks use full sentences in
the Task Name column; 3-4
Summary Tasks encompass
multiple deliverables (should
only be one)

12.4 Points

5-6 Summary Tasks do not
follow correct naming
structure; 5-6 Summary
Tasks use full sentences in
the Task Name column; 5-6
Summary Tasks encompass
multiple deliverables (should
only be one)

10.6 Points

7 or more Summary Tasks do
not follow correct naming
structure; 7 or more Summary
Tasks use full sentences in
the Task Name column; 7 or
more Summary Tasks
encompass multiple
deliverables (should only be
one)

18

Sub-Tasks

Uses a specific naming
convention, refers to a single
action, does not read like a
sentence

18 Points

All sub-tasks follow correct
naming structure; Sub-tasks
do not use full sentences in
the Task Name column; Sub-
tasks do not encompass
multiple actions

16 Points

1-2 sub-tasks do not follow
correct naming structure; 1-2
sub-tasks use full sentences
in the Task Name column; 1-2
sub-tasks encompass
multiple actions (should only
be one)

14.2 Points

3-4 sub-tasks do not follow
correct naming structure; 3-4
sub-tasks use full sentences
in the Task Name column; 3-4
sub-tasks encompass
multiple actions (should only
be one)

12.4 Points

5-6 sub-tasks do not follow
correct naming structure; 5-6
sub-tasks use full sentences
in the Task Name column; 5-6
sub-tasks encompass
multiple actions (should only
be one)

10.6 Points

7 or more sub-tasks do not
follow correct naming
structure; 7 or more sub-
tasks use full sentences in
the Task Name column; 7 or
more sub-tasks encompass
multiple actions (should only
be one)

18

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

VIII

see attached Project 4 includes two labs, Lab 9 and Lab 10. Lab 9 Assignment: Conducting Forensic Investigations on Network Infrastructure. Locate and complete Lab 9: Conducting Forensic Investigations on Network Infrastructure. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note:

Information Systems assignment 1

Page 1 of 2 Background iPremier (A), iPremier (B), and iPremier (C) cases describe an IT security crisis, and raise issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure of security risks. After you experience the cases and debrief what you have learned, you

Deliverable 6 – Project Close-Out Reports item options

Assignment Content 1. Top of Form Competency · Analyze metrics for information technology projects. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Scenario The Project Manager for GDS

Deliverable 3 – Art Event for Workplace Colleagues

Assignment Content 1. Top of Form Competency Utilize art elements in real-world contexts and the workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Scenario Your workplace has

Deliverable 2 – Grant Proposal Summary

Assignment Content 1. Top of Form Competency Identify the role of music, poetry, prose, and visual art in the modern world and workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details

Deliverable 1 – Timeline of Major Periods in Art

Assignment Content 1. Top of Form Competency Determine the historical impact of art on modern culture, society, and the workplace. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane.

Anti-Forensic Techniques

 Discuss anti-forensics techniques and explain how to detect steganography, hidden data in file system structures, trail obfuscation, and file extension mismatch. 

2 peer responses

Review the discussion posts and select two peers to respond to. Your two peer responses should be substantive. Substantive responses are those that further develop the topic and pursue an understanding of the domain. Simple messages that offer agreement or simple encouragement are considered conversant, but are not considered substantive.

VII

see attached Project 3 includes two labs, Lab 5, and Lab 6. Lab 5 Assignment: Conducting Forensic Investigations on Windows Systems. Locate and complete Lab 5: Conducting Forensic Investigations on Windows Systems. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note:

Research

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains how information systems affect business processes within the healthcare industry. 7035.1.2 :  Systems Development The graduate analyzes the different methods of system development for the purpose of recommending an appropriate method for a project. 7035.1.3 :  Health Information

Technology Leader

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital mechanics calculations and pioneered the use of computers. During her 33-year tenure at NASA, Johnson calculated trajectories, launch windows, and emergency return courses for the Project Mercury, Apollo

V

What are some nefarious purposes that stenography could be used for in the commission of a cybercrime? Do you think that stenography is a major security concern? Explain why or why not. Discuss what legitimate reasons a person would have for hiding data inside of an image, video, or audio

Computer Hardware & Software Project

Computer Hardware & Software Project OBJECTIVES: Successful completion of this assignment demonstrates your understanding of the following course level outcomes: 1. Explain the functions of hardware, software, data, procedures, and people in a business computer system. 2. Identify the major hardware elements of a computer system and describe the purpose

IV

see attached Lab 3 Assignment: Recovering Deleted and Damaged Files Locate and complete Lab 3: Recovering Deleted and Damaged Files. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below. Note: You do not have to complete Section 3 of the lab. 1.

Forensics

see attached. Unit III Project Project 1 includes two labs, Lab 1 and Lab 2. Lab 1 Assignment: Applying the Daubert Standard to Forensic Evidence Locate and complete Lab 1: Recognizing the Use of Steganography in Forensic Evidence. Upon completion of Section 2 of the lab, you are required to

Capstone Project: CSIS 474

Capstone Project: Project Management Assignment CSIS 474 Capstone Project Overview The objective of the final Capstone Project is to assess your knowledge on the learning objectives for the information technology program. All assignments in this course will build upon one another and provide you with different components for your Capstone

Input Device Dialogue

The choice of an appropriate input device for a product is often based on both the type of device being used and the target market for that device. For instance, a device targeted to college students and one targeted to older individuals may use different input methods. Suppose that you

Case Study-2

 Assessment 3:   This file is too large to display.View in new window