April 15, 2022

Uncategorized

BIT 1301 BUSS 202 BSD 1203 BISF 1202 BAC 1202 PROBABILITY AND STATISTICS.

UNIVERSITY EXAMINATIONS: 2021/2022 ORDINARY EXAMINATION FOR BACHELOR OF SCIENCE INFORMATION TECHNOLOGY, BSc. APPLIED COMPUTING, BSD, BISF, BBIT BIT 1301/ BUSS 202/ BSD 1203/ BISF 1202/ BAC 1202: PROBABILITY AND STATISTICS (EVENING/ DISTANCE LEARNING) DATE: DECEMBER, 2021 TIME: 2 HOURS INSTRUCTIONS: Answer Question One and any Other Two Questions QUESTION ONE (a)The arithmetic mean of a distribution is 5.The second and the third moments of the distribution about the mean are 20 and 140 respective. Find the third moment of the distribution about10 [8Marks] (b)A certain distribution has karl pearsons coefficient of skewness 0 ⋅ 4, standard deviation 10 and mean 40.5.Find the mode and the median of the distribution . [8Marks] (c)If 𝐴,𝐵 and 𝐶 are mutually independent events ,show that 𝐴 and 𝐴 ∪ 𝐵 ∪ 𝐶 are independent. [4Marks] QUESTION TWO QUESTION THREE (a) A fair coin is tossed 8 times. (i)What is the probability that the eighth toss results in a head given that preceeding 7 tosses were heads? [5Marks] (ii) What is the probability of getting eight heads or eight tails if the fair coin is tossed 8 times? [5Marks] (b)A student is taking multiple choice exam in which each question has four possible answers ,exactly one which is correct.If the student knows the answer he(she)selects one answer at random from the four possible answers.Suppose that the student knows the answers to 55% of the questions. (i)What is the probability that on a given question the student gets the correct answer? [2Marks] (ii)If the student gets the correct answer to a question what is the probability that he or she knows the answer? [3Marks] QUESTION FOUR (a)Determine the constant 𝑐 so that the function given below is a probability distribution of the random variable 𝑋 . [4Marks] (c)Bank tellers in a certain bank make errors in entering figures in their ledgers at a rate of 0.8 errors per page of entry..What is the probability that in five pages there will be three or more or errors? [3Marks] (d)Use the normal approximation to the binomial to calculate the probability of getting more than 39 defectives in a random sample of 400 taken from a population which is 8% defective. [4Marks]

BIT 1301 BUSS 202 BSD 1203 BISF 1202 BAC 1202 PROBABILITY AND STATISTICS. Read Post »

Uncategorized

BIT 1210  BBIT 1210  BCT 1104  BAC 1203  BISF 1203   BSD 1203 INTRDUCTION TO PROGRAMMING , PROG METHODOLOGY.

UNIVERSITY EXAMINATIONS: 2020/2021 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY / BUSINESS I. T/ APPLIED COMPUTING/ INFO. SECURITY & FORENSICS/ SOFTWARE DEV. BIT 1210/BBIT 1210/BCT 1104/BAC 1203/ BISF 1203/ BSD 1203: PROGRAMMING METHODOLOGY/ INTRODUCTION TO PROGRAMMING FULLTIME/ PART TIME/DISTANCE LEARNING ORDINARY EXAMINATIONS DATE: DECEMBER, 2021 TIME: 2 HOURS INSTRUCTIONS: Question ONE IS COMPULSORY, Choose TWO OTHER Questions QUESTION ONE (20 marks) Compulsory a). Using examples explain the relational operators used in a C program 6 marks b). Write a program to convert Celsius values to Fahrenheit using the following formula fahr = (9.0/5.0) * celsius + 32.0 8 marks c). Using examples differentiate between the division operator and the modulus operator 4 marks d). Define the term variable and explain how a variable is declared using appropriate examples 2 marks QUESTION TW0 (15 marks) a). Define the term program 1 marks b). Differentiate between i) source code and object code ii) Compiler and Interpreter iii) Syntax and Semantic error 6 marks c). Examine the benefits provided by High-level programming languages 4 marks d). Explain the main features of an algorithm 4 marks QESTION THREE (15 marks) a). Write a program for printing prime numbers between 1 and 100 6 marks b). List five basic data types used in C programming language 5 marks c). Explain any four components of a C program 4 marks QUESTION FOUR (15 marks) a) Describe using examples the syntax for following control structures: i) do while. (2 Marks) ii) while loop. (2 Marks) iii) Switch statement. (2 Marks) b) A program is required to accept two numbers A and B, if the value of A is greater than the value of B then they are added together otherwise the value of A is subtracted from B. Required: i) Write an algorithm to represent your solution (3 Marks) ii) Write a program in C programming language to accomplish the above. (6 Marks)

BIT 1210  BBIT 1210  BCT 1104  BAC 1203  BISF 1203   BSD 1203 INTRDUCTION TO PROGRAMMING , PROG METHODOLOGY. Read Post »

Uncategorized

BIT 1209 BBIT 1209 PRINCIPLES OF DATABASE SYSTEMS – AHINDU.

UNIVERSITY EXAMINATIONS: 2020/2021 EXAMINATION FOR BACHELORS DEGREE IN INFORMATION TECHNOLOGY/BBIT/ BAC/ BISF/ BSD BIT 1209/ BBIT 1209: PRINCIPLES OF DATABASE SYSTEMS ORDINARY EXAMINATIONS MODE: PARTTIME/ DISTANCE LEARNING DATE: DECEMBER 2021 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and Any Other TWO Questions QUESTION ONE [20 MARKS] Table banking is a means through which small scale traders can get access to micro loans. It is a new idea that brings banking services to small scale traders. The loans are mostly used to finance startup businesses where there is a realistic chance for repayment NOTE: Use the information provided to answer the question that follow: • Each borrower and lender must be registered, declare information such as name, and address. • A loan starts with a loan request, which contains information about when the loan should at latest be granted, The total laon amount, and how long the payback period is, and a description of how the money will be utilized. • Lenders can commit to an optional portion of the total amount of a loan request. • When the guarantee for the loan request covers the requested amount, the request is converted to a loan. If the guaranttee is not enough then the loan request is rejected. • A borrower can have more than one loan request, and more than one loan at a time, but can at most make one request per day. • The loan is paid through an “intermediary”, in this case, Mpesa • The borrower chooses when he or she will make a payment. Every payment must be registered in the database with an amount and a date (at most one payment per loan per day). The lenders share the repayment based on how large a part of the loan they are responsible for • If the loan is not repaid before the agreed upon deadline, a new date is agreed. The database must not delete the old deadline, but save the history (the deadline can be overridden multiple times). Required: a) Use the information (above) to create an E-R model that describes the information necessary to manage micro loans. [8 Marks] b) Give a brief description of relationship sets. [4 Marks] c) Using relevant example, explain the role of an entity. [4 Marks] d) State the Entity-Relationship scheme for defining constraints. [4 Marks] QUESTION TWO [15 MARKS] a) Write an SQL request that returns all the tuples with information on repayments from the borrower with id equal to 42, and where the lent amount exceeds Ksh.1000. [4 Marks] b) Using relevant examples, explain FOUR key properties that all database transactions must have. [8 Marks] c) Differentiate between authorization and authentication as used in database security. [3 Marks] QUESTION THREE [15 MARKS] a) Explain Four referential actions commonly used when defining foreign keys. [8 Marks] b) Briefly describe the Two kinds of data independence in Database Management Systems. [4 Marks] c) State any Three properties of relations in a relational database. [3 Marks] QUESTION FOUR [4 MARKS] a) Describe concurrency control? Further, give appropriate example. [2 Marks] b) Differentiate between shared lock and exclusive lock as used in transaction management in the Database Management System. [4 Marks] c) Define the term design methodology as used in database and explain the main phases of the database design process. [6 Marks] d. Explain Three demerits of views in databases. [3 Marks]

BIT 1209 BBIT 1209 PRINCIPLES OF DATABASE SYSTEMS – AHINDU. Read Post »

Uncategorized

BIT Dec. 2021\BIT 1208 BBIT 1208 FUNDAMENTALS OF ORGANIZATIONAL MANAGEMENT.

UNIVERSITY EXAMINATIONS: 202/ 2021 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY/ BUSINESS INFORMATION TECHNOLOGY/ APPLIED COMPUTING/ SOFTWARE DEVELOPMENT/ INFORMATION SECURITY & FORENSCIS BIT 1208/ BBIT 1208: FUNDAMENTALS OF ORGANIZATIONAL MANAGEMENT/ ORGANIZATION MANAGEMENT FULL TIME/ PART TIME/ DISTANCE LEARNING DATE: DECEMBER, 2021 TIME: 2HOURS INSTRUCTIONS: Answer Question One and Any Other TWO Questions QUESTION ONE (20MARKS) a) Analyze how an organization can better obtain or use resources to increase efficiency and effectiveness. (12 Marks) b) For each of the four key managerial functions, explain how they can contribute the most to your academic success. (8Marks) QUESTION TWO (15 MARKS) a) Outline four ways in which an organization may benefit from engaging in corporate social responsibility activities. Give relevant examples by citing four firms that do well in corporate social responsibility. QUESTION THREE(15 MARKS) a) Discuss the challenges that managers face in managing diversity at workplace. Explain how managers can overcome these challenges. QUESTION FOUR (15 MARKS) a) Explain different ways that managers can become unethical at workplace. (10Marks) b) Differentiate between restructuring and delayering and cite one reason why companies undertake each one of them. (5Marks)

BIT Dec. 2021\BIT 1208 BBIT 1208 FUNDAMENTALS OF ORGANIZATIONAL MANAGEMENT. Read Post »

Uncategorized

BISF 2204_ BISF 2204- COMPUTER FORENSICS.

UNIVERSITY EXAMINATIONS: 2021 EXAMINATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION SECURITY AND FORENSICS / BACHELOR OF SCIENCE IN APPLIED COMPUTING BISF 2204/ BISF 2204: COMPUTER FORENSICS FULL TIME/PART TIME DATE: DECEMBER 2021 TIME: 2 HOURS INSTRUCTIONS: Answer QUESTION ONE AND ANY OTHER TWO questions. QUESTION ONE – COMPULSORY [20 MARKS] a) Outline and explain what you need for the investigations to be successful and the Recommended steps of an investigation on Email Abuse 5 Marks b) Discuss in detail the Purpose of digital Forensics 4 Marks c) The most critical aspect of computer forensics is validating digital evidence. Describe different methods you can use to Validate digital evidence. 5 Marks d) Existing laws and statutes simply can’t keep up with the rate of technological change. Therefore, when statutes or regulations don’t exist, case law is used. Describe by giving a relevant example what is a case law. 6 Marks QUESTION TWO [15 MARKS] a) Identify and explain the steps need for any computer forensics activities. 10 Marks b) Explain the difference between A bit-stream copy and backup copy by giving examples. 5 Marks QUESTION THREE [15 MARKS] a) To investigate digital evidence effectively, you must understand how the most commonly used OSs work and how they store files. Explain what a partition table is, stating where it is located and its hexadecimal code offset. 10 Marks b) It is a requirement that a computer forensics investigator must exhibit the highest level of professional behavior at all times. Explain how one can maintain Professional Conduct. 5 Marks QUESTION FOUR [15 MARKS] KCA UNIVERSITY AFRICA would like to have digital forensic lab and the management have called you to advise them on quality assurance components checklist. Outline and describe the quality assurance checklist components that the digital forensics lab must have. 15 Marks

BISF 2204_ BISF 2204- COMPUTER FORENSICS. Read Post »

Uncategorized

BISF 2108   – ANONYMITY ON THE INTERNET.

UNIVERSITY EXAMINATIONS 2021 EXAMINATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION SECURITY AND FORENSICS / BACHELOR OF SCIENCE IN APPLIED COMPUTING BISF 2108 : ANONYMITY ON THE INTERNET FULL TIME DATE: DECEMBER 2021 TIME: 2 HOURS INSTRUCTIONS: Answer QUESTION ONE AND ANY OTHER TWO questions. QUESTION ONE – COMPULSORY [20 MARKS] a) Outline and explain Types of Anonymity 4 Marks b) Discuss in detail the Uses of Anonymity 6 Marks c) Explain The following Basic terms as used in Anonymity Technology I. Anonymous Remailers 2 Marks II. A Cypherpunk 2 Marks d) Outline the Best practices of threat modelling 6 Marks QUESTION TWO [15 MARKS] a) Identify and explain the Levels of Anonymity. 10 Marks b) Explain the difference between Privacy and data protection by giving examples. 5 Marks QUESTION THREE [15 MARKS] a) Illustrate how Internet services has redefined privacy environment 5 Marks b) Describe how Anonymous Proxy Server is able to achieve the goals of anonymity when one is browsing . 5 Marks c) Outline and explain Ways to Stay Anonymous Online 5 Marks QUESTION FOUR [15 MARKS] a) KCA UNIVERSITY AFRICA would like to consult you on anonymity Mechanisms. Outline and explain the best anonymity Mechansim . 10 Marks b) State the importance and how threat Modeling work 5 Marks

BISF 2108   – ANONYMITY ON THE INTERNET. Read Post »

Uncategorized

BISF 1304  CLOUD COMPUTING.

UNIVERSITY EXAMINATIONS: 2020/2021 EXAMINATION FOR THE DEGREES OF BACHELOR OF SCIENCE IN INFORMATION SECURITY & FORENSICS BISF 1304: CLOUD COMPUTING FULLTIME/ PART TIME/DISTANCE LEARNING ORDINARY EXAMINATION DATE: DECEMBER, 2021 TIME: 2 HOURS INSTRUCTIONS: Question ONE IS COMPULSORY, Choose TWO OTHER Questions QUESTION ONE (20 Marks) Compulsory a). What is IaaS? Mention any two IaaS service providers? (4 Marks) b). State and explain service models of cloud computing with architectures? (10 Marks) c). Explain SOA with its applications? (4 Marks) d). Distinguish between elasticity and scability in cloud computing (2 Marks) QUESTION TW0 (15 Marks) Discuss a). Security challenges in cloud computing. (7 Marks) b). Risk management in cloud. (8 Marks) QUESTION THREE (15 Marks) a). Differentiate between different types of virtualization? (5 Marks) b). Discuss SaaS maturity models? (5 Marks) c). Explain different cloud service deployment models? (5 Marks) QUESTION FOUR (15 Marks) Explain the following a). Cloud Service Brokerage (5 Marks) b). Challenges of Mobile Cloud computing (5 Marks) c). Amazon Web Service (AWS) (5 Marks)

BISF 1304  CLOUD COMPUTING. Read Post »

Uncategorized

BISF 1208 SEMICONDUCTORS AND DIGITAL ELECTRONICS.

UNIVERSITY EXAMINATIONS: 2020/2021 EXAMINATION FOR THE DEGREES OF BACHELOR OF SCIENCE IN INFORMATION SECURITY & FORENSICS BISF 1208: SEMICONDUCTORS AND DIGITAL ELECTRONICS FULLTIME/ PART TIME/DISTANCE LEARNING ORDINARY EXAMINATION DATE: DECEMBER, 2021 TIME: 2 HOURS INSTRUCTIONS: Question ONE IS COMPULSORY, Choose TWO OTHER Questions QUESTION ONE (a) State: i. Two ways of ionizing an atom ii. Two advantages of silicon over germanium diodes (4 Marks) (b) Define the following with respect to semiconductors: i. Covalent bond ii. Drift current (4 Marks) (c) With the aid of a labelled diagram, describe the formation of depletion layer at the P-N junction. (7 Marks) (d) Figure 1 shows a diagram of an N- type material of resistance 2 KΩ connected across a 15V d.c supply. Figure 1 i. Redraw the diagram showing the direction of electrons and holes inside the material ii. Taking the electronic charge, e=1.6 X 10-19 C, determine the I. Current through the material II. Number of electrons passing through a given point per second N- TYPE MATERIAL III. Electrical energy expended if the current is maintained for 30Ms (9 Marks) (e) Draw the circuit of a common collector configuration of a transistor amplifier. (6 Marks) QUESTION TWO (a) Define the following i. Transistor biasing ii. Transistor saturation iii. Feedback current (3 Marks) Figure 2 (b) Figure 2 shows a circuit diagram of an amplifier using the collector base feedback biasing. Taking β=50 and Vbe=0.7V, determine the: i. Base current Ib; ii. Collector current Ic: iii. Collector emitter voltage, Vce (9 Marks) (c) Sketch the transfer characteristic curve for a common emitter transistor. (3 Marks) QUESTION THREE (a) State three(3) advantages and disadvantages of FETs. (6 Marks) (b) Using a diagram of a CMOS voltage multiplier circuit: i. Explain its operation ii. Sketch the output wave form, when subjected to sinusoidal wave form at the input iii. State three applications of this circuit (9 Marks) QUESTION FOUR (a) Draw a well labelled diagram of half wave regulated power supply and explain the function of each component used (6 Marks) (b) A full wave bridge rectifier is supplied from a transformer whose secondary voltage is 60Vrms. Determine the: i. Peak value of the secondary voltage: ii. DC voltage of the rectifier output; iii. Ripple factor. (9 Marks) QUESTION FIVE (a) State three: i. Components of sinusoidal wave. ii. Biasing methods of bipolar junction transistor (BJT) (6 Marks) (b) A sinusoidal wave of 50Hz with maximum voltage of 10V for a period of 2nS. Determine: i. Its instantaneous voltage ii. Time t when frequency shifted to 100Hz iii. Its instantaneous voltage at t=2µs in (b)ii above (9 Marks)

BISF 1208 SEMICONDUCTORS AND DIGITAL ELECTRONICS. Read Post »

Uncategorized

BISF 1101 BSD 1102 Computer Organization  Architecture.

UNIVERSITY EXAMINATIONS: 2020/2021 EXAMINATION FOR THE DEGREES OF BACHELOR OF INFORMATION SECURITY AND FORENSICS/ BACHELOR OF SCIENCE SOFTWARE DEVELOPMENT BISF 1101/ BSD 1102: COMPUTER ORGANIZATION & ARCHITECTURE FULLTIME/ PARTTIME DATE: DECEMBER, 2021 TIME: 2 HOURS INSTRUCTIONS: QUESTION ONE IS COMPULSORY, CHOOSE TWO OTHER QUESTIONS QUESTION ONE (20 Marks) Compulsory a) Differentiate Synchronous from Asynchronous data transmission (2 Marks) b) Define the following terms as used in computer architecture and organization i. Data (2 Marks) ii. Data Representation (2 Marks) iii. Digitization (2 Marks) c) Justify the reason why your PC becomes slow and propose three ways on how will you solve the problem (6 Marks) d) Calculate the following i. (-36)10 = (?)2 (2 Marks) ii. (2AD) 16 = (?)2 (2 Marks) iii. (11101000) 2 – (00101000) 2 = (?)2 (2 Marks) QUESTION TW0 (15 Marks) a) Discuss any five functions of the operating system (5 Marks) b) Solve: i. (110) 2 – (1010) 2 = (?)2 (3 Marks) ii. (110) 2 * (1010) 2 = (?)2 (2 Marks) c) Explain any five differences between a RAM and ROM (5 Marks) QUESTION THREE (15 Marks) a) Explain the purpose of the three types of system buses (6 Marks) b) Outline any two differences between computer architecture and computer organization (4 Marks) c) Discuss the evolution of computer circuitry in the five computer generations (5 Marks) QUESTION FOUR (15 Marks) a) Convert the following numbers ii. (2057)8 = (?)16 (4 Marks) b) Define data compression, and elaborate in detail the difference between Lossy and Lossless data compression schemes (4 Marks) c) What is a cache memory; discuss the purpose of the L1 and L2 cache memory (5 Marks)

BISF 1101 BSD 1102 Computer Organization  Architecture. Read Post »

Uncategorized

BIT 2103, 3207  BBIT 2110  BAC 3106  BSD 2207  BISF 2106  ARTIFICIAL INTELLIGENCE.

UNIVERSITY EXAMINATIONS: 2020/2021 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY / BUSINESS I. T/ APPLIED COMPUTING/ INFO. SECURITY & FORENSICS/ SOFTWARE DEV. BIT 3207/ BBIT 2110/ BAC 3106/ BSD 2207/ BISF 2106: ARTIFICIAL INTELLIGENCE/ PRINCIPLES OF A.I FULLTIME/ PART TIME/DISTANCE LEARNING DATE: DECEMBER, 2021 TIME: 2 HOURS INSTRUCTIONS: Question ONE IS COMPULSORY, Choose TWO OTHER Questions QUESTION ONE (20 Marks) Compulsory a). Expert systems is one of the main branches artificial intelligence, discuss five ways in which it can be applied in commerce (5 Marks) b). Describe each of the following inference techniques as applied in artificial intelligence i). Forward chaining ii). Inductive reasoning iii). Case based reasoning (6 Marks) c). The diagram below shows a directed graph, determine the order in which the nodes will be printed using the depth first algorithm starting with node H (4 Marks) d). Outline four test items that a computer needs to pass in order to be considered intelligent (5 marks) QUESTION TW0 (15 marks) a). Using an example in each case, explain the following elements of an intelligence agent i). Actuators ii). Precepts iii). Sensors iv). Goal v). Agent function (5 Marks) b). Construct a semantic network representations of the following statements • Martha is Kenyan and she is a scientist. • Scientists work in a research lab (5 Marks) c). Write predicate logic statements for the following statements. Indicate the knowledge that is inferred from the statements;– (5 Marks) i). Tilapia is a name of fish. ii). All fishes belong to the class of vertebrates iii). All vertebrates either live on land or in water. QUESTION THREE (15 marks) a). Convert the following argument into symbolic representation using propositional logic If Edith eats her vegetables, then she can have a cookie. Edith ate her vegetables. Therefore, Edith gets a cookie. (5 Marks) b). Describe five characteristics of a good knowledge representation technique (5 Marks) c). Given the sample prolong program, explain clearly the meaning of each statement (5 Marks) ❖ Happy (joy). ❖ Listen to Music (Mary) . ❖ Plays Keyboard (joy);- Listens to music (joy). ❖ Happy (joy) ❖ Play keyboard (many):- happy (Mary). ❖ Listens to music (Mary). QUESTION FOUR (15 marks) a). Show that the following expression are logically equivalent using a truth table ¬ (P ∧ Q) = (¬P) ∨ (¬Q) (6 Marks) b). Discuss the possible dangers of artificial intelligence as expressed by critics of advancements in artificial intelligence (3 Marks) c). Explain the following terms as used in Artificial intelligence (6 Marks) i). Natural Language processing ii). Machine vision iii). Robotics

BIT 2103, 3207  BBIT 2110  BAC 3106  BSD 2207  BISF 2106  ARTIFICIAL INTELLIGENCE. Read Post »

Uncategorized

BISF 3205 PENETRATION AND VULNERABILITY TESTING.

UNIVERSITY EXAMINATIONS: 2021/2022 EXAMINATIONS FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION SECURITY AND FORENSICS BISF 3205: PENETRATION AND VULNERABILITY TESTING FULL TIME/PART TIME DATE: DECEMBER, 2021 TIME: 2 HOURS INSTRUCTIONS: Answer QUESTION ONE AND ANY OTHER TWO questions. QUESTION ONE – COMPULSORY [20 MARKS] a) Discuss the benefits of conducting a penetration test. 5 Marks b) Discuss any five common areas of penetration testing. 5 Marks c) Differentiate between Penetration Testing, Security Auditing and Ethical Hacking, highlighgting the similarities and differences. 6 Marks d) Discuss the steps involved in conducting a penetration test 4 Marks QUESTION TWO [15 MARKS] a) Discuss in detail the WLAN penetration testing steps. 10 Marks b) Outline the steps for router penetration testing. 5 Marks QUESTION THREE [15 MARKS] a) Discuss in detail the database penetration testing steps. 10 Marks b) Discuss how you would conduct a switch penetration test. 5 Marks QUESTION FOUR [15 MARKS] Discuss in detail how you would go about conducting a web application penetration testing. Document every step and highlight what you would be looking for. 15 Marks

BISF 3205 PENETRATION AND VULNERABILITY TESTING. Read Post »

Uncategorized

Integrated Change Control

Integrated change control examines the proposed change and determines its effect on the entire project, not just the scope, schedule, costs, and contract. Integrated change control examines nine project management knowledge areas to determine what effect the change will have on each knowledge area: Scope – any change, even if it doesn‘t appear to affect the project scope, are always examined to see if the change may have any impact on the project scope. Schedule – the project manager examines the proposed change to see if the project  schedule is affected. The project manager consider resource availability, access to the job site, cash flow predictions, and deadlines in the project schedule. Costs – the project budget is constantly monitored for changes, even minor changes to the project budget can accumulate into significant cost overruns within the project. Labor is typically the largest expense on a project, so overages on completing project tasks can quick drive changes to the project costs. Quality– any change can affect the expected quality of the project work. Any change, in particular changes to the project scope, can affect the quality and must be monitored for defects and unacceptable project work. Changes to the project schedule can affect project quality as the work force may rush through assignments to meet the project schedule, but generate defects in the rushed work. Human resources – changes to the project may require additional labor, specialized labor, or if the project is delayed, the project manager may lose key resources that have other assignments that now conflict with the delayed project schedule. Changes to the project team, such as team members leaving the organization, can also affect the entire project. Communications – changes within the project must be communicated to the appropriate stakeholders at the appropriate time. When a change happens the project manager must examine who needs to be informed of the change and communicate the change in the best modality considering the change implications. Risk– changes to the project can threaten the success of the project. Minor changes can have a domino effect on the project and introduce significant risks. All proposed changes must be examined for any possible risks the change may introduce to the project‘s ability to reach its objectives. Procurement – changes to the project can affect the procurement of the project. Consider changes to the project scope and how the need for additional materials, contract labor, or facilities can affect the need to procure these goods and services. Stakeholders– changes to the project can positively or negatively affect the stakeholders‘ synergy, excitement, and support of the project. The project manager must examine the potential affect the change may have on the project stakeholders. Some changes can add or remove stakeholders to the project; for example, adding or removing elements to the project scope can add or remove additional stakeholders to the project.

Integrated Change Control Read Post »

Scroll to Top