Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

IT Project Management

The instructions for the assignment are in the attached folder.

Work Breakdown Structure for a Wedding
(Individual project)

WBS for a Wedding Spring 2024 Page 1 of 2

Overview

The purpose of this Individual assignment is to develop a WBS (Work Breakdown Structure). NOTE: You
will need Microsoft Project for this assignment. Since this will be an introduction to Microsoft Project,
the scope of the WBS is relatively small.

Assignment for the Wedding WBS

The scenario is this – Your best friend asked you to help plan a wedding in another city. You have no
concern for schedule or budget at the moment, only defining the work that needs to be done for the
wedding to start on time and to be successful. There will be up to 100 guests.

As there are different ways to organize a WBS, you should choose one of the patterns below. This WBS
can be organized by functions or by physical locations, choose just one. Of course, there are other
patterns that could be used but these look like logical choices for this project.

WBS Organized by Location WBS Organized by Function

Outline
Level WBS Element

Outline
Level WBS Element

0 The wedding project 0 The wedding project

1 Airport arrangements 1 Event programming

1 Guest hotels 1 Guest arrangements

1 Church arrangements 1 Catering

1 Reception arrangements 1 Musical entertainment

1 Wedding outfits 1 Floral displays

1 Going away outfits 1 Wedding outfitting

1 Honeymoon arrangements 1 Transportation

Things to remember:

• First, change the MS-Project default configuration settings, see the Project Configuration
Settings section in “Project Tutorials” (Course Resources → Microsoft Project).

• Don’t go overboard on details, i.e., do not go deeper than Outline Level 3.

• Even though this is a small project, make sure you have enough details, i.e., enough sub-tasks to
show how you will complete the Summary Task deliverable.

• Do indent sub-tasks, see the Adding Tasks to the Schedule section in “Project Tutorials” (Course
Resources → Microsoft Project).

• Show the WBS column, see Show the Project WBS Numbers section in “Project Tutorials”
(Course Resources → Microsoft Project).

Work Breakdown Structure for a Wedding
(Individual project)

WBS for a Wedding Spring 2024 Page 2 of 2

• Follow task naming conventions, see the Week 1 Readings, “How to Build Work Breakdown
Structures”, and “What NOT to do in a WBS”.

o A sub-task should be named using verb, adjective and noun – there is action performed.

o A Summary task should be named using noun / adjective structure (NO VERBS) – it
describes what will be delivered instead of what work will be done.

• No blank rows, i.e.,

• Summary tasks and sub-tasks should address only one (not multiple) deliverable (or action).

• Never use full sentences in the Task Name column of the schedule.

IMPORTANT: Submit this file named as “[LastnameFirstname] [Deliverable] Week 1”
EXAMPLE: RowleyGarrett WBS Week 1

IMPORTANT – Use Your Name, but no Special Characters in the File Name

Grading Rubric

Criteria
90-100%

Far Above Standards

80-89%

Above Standards

70-79%

Meets Standards

60-69%

Below Standards

< 60%

Well Below Standards

Possible
Points

Configuration Settings

Needed for producing
consistent results in the
project schedule

12 Points

All configuration settings
correct

10.7 Points

Missed 1-2 configuration
settings

9.5 Points

Missed 3-4 configuration
settings

8.3 Points

Missed 4-5 configuration
settings

7.1 Points

Missed 5 or more
configuration settings

12

WBS Structure

Includes appropriate level of
decomposition, uses
Project’s WBS numbering,
requires indenting sub-tasks,
and continuous rows

12 Points

Correctly decomposed the
schedule to Outline Level 3;
Did not leave blank rows in
the schedule; Did not
manually enter WBS numbers

10.7 Points

Decomposed too little (to
Outline Level 2), or too much
(to Outline Level 4)

9.5 Points

Over-decomposition (to
Outline Level 5)

8.3 Points

Far too much decomposition,
beyond Outline Level 5

7.1 Points

No decomposition at all,
stopped at Outline Level 1;
Left blank rows in the
schedule; Manually entered
WBS numbers

12

Summary Tasks

Uses a specific naming
convention, refers to a single
deliverable, does not read like
a sentence

18 Points

All Summary Tasks follow the
correct naming structure;
Summary Tasks do not use
full sentences in the Task
Name column; Summary
Tasks do not encompass
multiple deliverables

16 Points

At least two sources are 1-2
Summary Tasks do not follow
correct naming structure; 1-2
Summary Tasks use full
sentences in the Task Name
column; 1-2 Summary Tasks
encompass multiple
deliverables (should only be
one)

14.2 Points

3-4 Summary Tasks do not
follow correct naming
structure; 3-4 Summary
Tasks use full sentences in
the Task Name column; 3-4
Summary Tasks encompass
multiple deliverables (should
only be one)

12.4 Points

5-6 Summary Tasks do not
follow correct naming
structure; 5-6 Summary
Tasks use full sentences in
the Task Name column; 5-6
Summary Tasks encompass
multiple deliverables (should
only be one)

10.6 Points

7 or more Summary Tasks do
not follow correct naming
structure; 7 or more Summary
Tasks use full sentences in
the Task Name column; 7 or
more Summary Tasks
encompass multiple
deliverables (should only be
one)

18

Sub-Tasks

Uses a specific naming
convention, refers to a single
action, does not read like a
sentence

18 Points

All sub-tasks follow correct
naming structure; Sub-tasks
do not use full sentences in
the Task Name column; Sub-
tasks do not encompass
multiple actions

16 Points

1-2 sub-tasks do not follow
correct naming structure; 1-2
sub-tasks use full sentences
in the Task Name column; 1-2
sub-tasks encompass
multiple actions (should only
be one)

14.2 Points

3-4 sub-tasks do not follow
correct naming structure; 3-4
sub-tasks use full sentences
in the Task Name column; 3-4
sub-tasks encompass
multiple actions (should only
be one)

12.4 Points

5-6 sub-tasks do not follow
correct naming structure; 5-6
sub-tasks use full sentences
in the Task Name column; 5-6
sub-tasks encompass
multiple actions (should only
be one)

10.6 Points

7 or more sub-tasks do not
follow correct naming
structure; 7 or more sub-
tasks use full sentences in
the Task Name column; 7 or
more sub-tasks encompass
multiple actions (should only
be one)

18

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

VII

see attached. CybersecurityPolicies Without Borders This assignment measures your mastery of ULOs 2.1, 2.2, 2.3, 5.3, and 6.2. Unlike countries, the Internet is not confined to specific national borders or geopolitical boundaries defying traditional governance. Perform research in the CSU Online Library and the Internet, and answer the following questions:

Information Systems VI Aassignment

see attached. Course Textbook(s) Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.

power point

Video Presentation As a synthesis of the prior five weeks, each student will create an informational video presentation. The video presentation must be a Senior Executive Level presentation to a real world company/organization. If students are unfamiliar with that style of presentation, they are to research it.  Application of Learning:

V

see attached During the Bush and Obama administrations and because of 9/11, the Department of Homeland Security (DHS) assumed lead responsibilities for many of the CIKR sectors assigning Sector-Specific Agencies (SSAs) to establish sector-specific protocols for protection. However, most of these sectors have the DHS as its SSA. Under this

IV Journal

see attached. Should the private sector be proactively involved in all phases of preparedness for attack avoidance (either physical or cyber-based) or should the private sector act solely as a resource when called upon by the public/government sector? Why, or why not? Your journal entry must be at least 200

SA

see attached  Begin by researching and identifying a critical infrastructure sector or component (there are 18 of them to choose from) such as power, finance and banking, or municipal services. Perform an analysis of the selected component, identifying its vulnerabilities. After conducting your research, either in the CSU Online Library

Course Closure

  Congratulations on reaching the end of this course! This week: Discuss the salient manner in which you would apply the learning outcomes of this course to your professional and/or personal life. Talk about the topics you found most valuable or useful, either personally or professionally.

Relational Set Operators

  A relational database model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as “union” and “intersect” may be used. Describe a business scenario where a “union” relational set operator may be used to merge two similar data sets. Analyze the analysis and data consistency

Concurrency Control

  There are times when a database is accessed by many users across the enterprise. Transaction logs can help maintain concurrency in a multiuser platform. Describe at least two business scenarios where “commit” and “rollback” would be required. Describe how these functions would be essential for business continuity and concurrency

Healthcare Industry Solutions: Transforming Patient Care and Operational Efficiency

Healthcare industry solutions refer to a wide range of technologies, tools, and strategies designed to improve the way healthcare organizations operate and deliver patient care. These solutions combine software, digital platforms, data analytics, medical devices, and process innovations to address challenges in hospitals, clinics, pharmaceutical companies, insurance providers, and the

Comprehensive SharePoint and Teams Migration Solutions

   Modern businesses depend on collaboration and document platforms to stay productive, and moving these systems during a tenant migration is often complex. CloudBik’s Teams to Teams Migration offers an effective way to transfer Teams environments, including chats, channels, and files, without impacting end-users. At the same time, the SharePoint

Why Businesses Need Tenant to Tenant Migration

   The need for Tenant to Tenant Migration is growing as many companies go through mergers, acquisitions, or restructuring. Having data in two separate tenants can create confusion and extra work for IT teams. Moving everything into one tenant gives users a simple and unified experience. The OneDrive Migration Tool

Easy Data Transfer from Google to Office 365

  Many businesses choose Microsoft 365 over Google Workspace because it connects better with apps like Excel, Teams, and Outlook. But during migration, the main worry is losing data or breaking folder structures. The migrate from Google Workspace to Office 365 blog explains how to transfer emails, calendars, and files safely

HIS-D40-C

I have a question about Health Information System, who can help with questions?

HIS-B39-C

My questions are about Health IS. Who can help with these questions?

Advanced SQL and PL/SQL

  Extracting and interpreting data can be very valuable to an organization. Describe the importance of using sub queries in a database system. Provide at least two business case scenarios to support your response.

creating

Create a Visual Origin Story In Module 1 you are to complete the team-building exercise ” Visual Origin Story: Adventures in collaborative storytelling .” This exercise is from the book:  Murdoch-Kitt, K. M., & Emans, D. J. (2020). Intercultural collaboration by design drawing from differences, distances, and disciplines through visual