[Audio] Hello professor, welcome to unit 4 project Project Control.
[Audio] The summary of the project is A major corporation will be able to organize and keep track of the professional growth of its personnel thanks to the system that will be created. Employees should be able to find and schedule professional development opportunities that are pertinent to their roles using the system. Both sophisticated search tools and the capacity to add upcoming events to employees' calendars are requested. To enable workers to find out who is attending conferences and events, the system must offer social networking..
[Audio] Next the 3 functional Requirements Login the user can able login using the login tab Search for a video Users can browse various website parts by clicking the side navigation page.
[Audio] 3 non functional requirements Performance: how fast a system should respond to the requests by the users Readability: it should have bigger font size which will be easier for the senior users to access the system Security: how well a system protects against unauthorized access and data breaches.
[Audio] Functional requirements of team members Add a Chatting Window (Imran) Live support (Imran) Download the certificate after completion ( Tejal) Schedule for a video for next week (Tejal).
[Audio] Non functional requirements of team members Usability: a system should be easy to use (Tejal) Maintainability: a system should be easier to update and modify the system (Tejal) Reliability (Imran) Scalability (Imran) Portability(Tejal).
[Audio] Risk analysis Data Breach A data breach is an incident that exposes sensitive, private, protected, or confidential information to someone who is not allowed to have access to it. Sensitive data breaches happen when it is taken or disclosed to unauthorized parties. External assaults like hackers, viruses, or phishing schemes can result in breaches. Disgruntled or inadequately trained staff can also cause internal data breaches. Solution Data breaches may be less frequent in IT settings with routine internal audits. A company's ability to avoid data breaches depends on having the appropriate, modern security tools and technology in place. All staff must, however, adopt a thorough approach to cybersecurity and be knowledgeable on how to address a data breach..
[Audio] Team members risk and solutions Cyberattack (Tejal) Every day, corporations are the target of cyberattacks. Arguably the most prevalent attack is phishing, in which employees are tricked into divulging personal information through phony emails. Usually, these emails pose as coworkers and ask the victim to provide sensitive information via email. Alternatively, they instruct the target to click on a link that takes them to a malicious website. Solution: Update the software. While outdated software systems may be more prone to errors, modern software systems are more reliable. backup data encrypt data using strong passwords install a firewall Power Breakdown ( Imran) Power breakdown not only stop the work but also had adverse effect on the computer devices and units. Solutions Devices should be connected to battery backup or UPS and installing generators.
[Audio] Ethical Considerations Team members must finish the project within the quoted budget Project must submit within the scheduled date The data should not be sold to other parties All research participants must voluntarily engage to avoid any sort of coercion or pressure. Knowing the participants yet excluding all identifying information from your report demonstrates confidentiality..
[Audio] Summary of the project This project will promote fostering relationships and ensure coverage of conferences that are considered of high importance. It will help the employees to find and schedule professional development opportunities that are pertinent to their roles using the system. It enables the workers to find out who is attending conferences and events, the system will offer social networking. Creating and adhering to the project's budget is a crucial duty for project managers. The project manager is responsible for handling unforeseen financial difficulties and reallocating resources as needed. Thank you.