Develop an implementation plan that would be useful to the Training group in changing to a computerized project tracking system. Use a paragraph to explain your approach. Be sure that what you are doing also meets Snowden’s expectations.

The implementation plan would include the following:

A. Latest versions of Web software to be installed on the Shiroma computers in the Training Unit. The Training Unit would be able to keep their Shiroma computers and this would help to promote the “peaceful co-existence” between the groups that is important to Snowden. If the data is to reside on the mainframe, provide server-side methods to exchange data with the mainframe.

B. The Comtex computers in the Training Unit would be connected to the existing Systems Management department network as well as the Web servers companywide.

C. A support person would be assigned to answer questions and resolve problems about the Comtex computers for the Training Unit.

D. The Training Unit needs to be trained in several areas:

i. How to use the Web software, including the forms, various options available, and so on.
ii. A “How to use the Global Engineering Management System (G E M S)” training manual that would be developed for all projects.
iii. How to use the intranet services.

One approach to developing the training is to have the Training Unit help plan their instruction. This would help to smooth the transition.

Another consideration is the personality of the trainer. Because the makeup of the Training Unit consists of people who are fairly artistic, training should be more relaxed, sprinkled with humor, and perhaps more unconventional.


A. The information stored in the manual files currently in use by the Training Unit needs to be entered into the new system.

B. The new system should be implemented.

C. An evaluation of the project should be performed.

Computer Science & Information Technology

You might also like to view...

If the loop-continuation condition in a for header is initially ____________ , the program does not execute the for statement’s body

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____________ argues that, in the future, modern notions of privacy will be obsolete.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ is the process of acquiring the traits of one's predecessors.

A. Heritage B. Legacy C. Inheritance D. Encapsulation

Computer Science & Information Technology

Which of the following best describes the objectives of succession planning?

A. To identify and document the successive order in which critical systems should be reinstated following a disaster situation B. To ensure that a personnel management plan is in place to ensure continued operation of critical processes during an incident C. To determine the appropriate order in which contract internal resources, third party suppliers and external customers during a disaster response D. To document the order that systems should be reinstated at the primary site following a failover operation at a backup site.

Computer Science & Information Technology