Question: You are managing a secure software engineering project with tasks like secure authentication ( OAuth 2 . 0 ) , data encryption ( AES -

You are managing a secure software engineering project with tasks like secure
authentication (OAuth 2.0), data encryption (AES-256), and penetration testing. Despite
implementing automated tools like static code analysis, vulnerability scanners, and
automated testing, the project is experiencing delays and cost overruns due to
misconceptions about the effectiveness of these tools.
The project details are as follows:
Total Planned Effort: 120 person-days
Planned Completion by this point: 5 tasks out of 6
Actual Completion by this point: 4 tasks out of 6
Actual Effort Spent (AC): 125 person-days
You are using Earned Value Management (EVM) to assess the project's schedule and cost
performance. Based on the provided details, calculate the following key metrics:
Planned Value (PV)
Earned Value (EV)
Actual Cost (AC)
Schedule Performance Index (SPI)
Cost Performance Index (CPI)
Schedule Variance (SV)
Cost Variance (CV)
Options:
APV=100 person-days, EV=80 person-days, AC=125 person-days, (S)/(P)I =0.8,(C)/(P)I =
0.64,SV=-20 person-days, CV=-45 person-days
BPV=120 person-days, EV=100 person-days, AC=125 person-days, (S)/(P)I =1.0,(C)/(P)I =
1.0, SV =0 person-days, CV =0 person-days
C1.1,SV=10 person-days, CV=-40 person-days
DEV=75 person-days, AC=110 person-days, (S)/(P)I =0.9,(C)/(P)I =
0.75,SV=-15 person-days, CV=-35 person-days

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!