Chat with us, powered by LiveChat This is the fifth and final course project deliverable in the series of five sequential assignments in this course. You are continuing on in your role as the CT - EssayAbode

This is the fifth and final course project deliverable in the series of five sequential assignments in this course. You are continuing on in your role as the CT

ALL PREVIOUS PROJECTS ARE ATTACHED FOR REFERENCE. PLEASE USE PRESENTATION TEMPLATE.

Overview

This is the fifth and final course project deliverable in the series of five sequential assignments in this course. You are continuing on in your role as the CTO of a hypothetical e-commerce start-up company of your design.

Throughout the course, you have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In the third course project deliverable, you created an infrastructure design that considered the key elements of software, hardware, security, and business process flow for your e-commerce startup company. Once again you updated the supporting Gantt chart based on the major and minor tasks identified in the infrastructure design document.
  • In the fourth course project deliverable you developed the system implementation document. This document spelled out the EFI technical aspects of your e-commerce company's information systems infrastructure. Again you updated the supporting Gantt chart to reflect the major and minor tasks identified in the system implementation document.

You are now in the final stage of the project plan development. You will leverage all previous deliverables and integrate them into one document that will serve as the project’s statement of work.

Your goal is for the start-up company’s executive team and the venture capital group to approve and fund your project. The detailed project plan is necessary to accomplish the monumental implementation task. The executive team and investors, however, are only interested in an executive summary in the form of a 10–15-slide PowerPoint presentation. As a result, you are required to create a compelling PowerPoint presentation, supported by the detail in your project plan, which convinces the executive group that your solution is optimal.

This assignment consists of two parts:

Part 1: Comprehensive Project Plan

You will create an 8–10-page final comprehensive project plan. This document will distill down the most salient points from each of the four previous course deliverables into one integrated, cohesive comprehensive project plan that persuades investors of the recommended approach.

Critical Note: Do NOT simply combine the previous four assignments into one 30–50-page document. Instead, your task is to:

  • Review each of the four previous assignments.
  • Select the most critical information from each that investors need to know to make an informed investment decision.
  • Summarize the information you selected.
  • Ensure that the selected information flows from one section to the next in a cohesive and compelling fashion.
Part 2: Executive Presentation

You will create a 10–15-slide compelling executive presentation that convinces the start-up company’s executive team and potential investors to invest in the company. Your recommended solution is the one that can grow this $5 million dollar e-commerce start-up company into a $30 million dollar company within the next two years.

Instructions 

Part 1: Comprehensive Project Plan

You are to write a comprehensive 8–10-page comprehensive, final project plan in which you:

  1. 1. Describe the project's goals, objectives, scope, and control measures.
  2. 2. Relate the value of the proposed solution to the competitive advantage that information technology will afford the e-commerce company.
  3. 3. Provide a rough estimate of the entire project’s cost, including hardware, software, and labor.
    • The work you did to create the bill of materials in the fourth course project deliverable will help you with this.
  4. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Executive Presentation

You are to create a 10–15-slide executive PowerPoint presentation to persuade potential investors to invest in your e-commerce start-up company. In your presentation you are to:

  1. Illustrate the concepts from your 8–10-page comprehensive project plan in an executive presentation.
  2. Create bulleted speaking notes to the executive board in the Notes section of your PowerPoint presentation.

Note:

  • Create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
  • Consider including images, graphics, charts, tables, etc. in your presentation to increase audience engagement.

Your Company’s Name Here

The name of your presentation or project here

Your Name

Date

Class Name

Professor Name

University Name

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

1

Table of contents or list of stuff you’re going to cover in your presentation

Project's goals

Objectives

Scope

Control measures.

value of the proposed solution (Compared to competitive advantage)

Project’s cost Estimate

Gantt Chart

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

2

Project's goals

List your goals

And maybe sub goals

If you have more than one sub-goal

Here.

Major goals and sub goals listed

Up here in the slide

And explained in the notes fully below

Up here will jog your memory and below is what you actually say

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

3

Objectives

List of objectives

Main points again from your paper

Sub points tabbed in here

Keep these brief

Maybe add pictures or charts

To keep it fresh

And creative

Co-workers in the Accounting Dept.

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

4

Scope

Talk about your scope

Just use bulleted lists to jog your memory

The detail is below in the notes section

Grab the bar with your pointer if you can’t see the notes

Go on Youtube or LinkedIn Learning if you don’t know Powerpoint.

It’s easy to learn.

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

5

Control measures

Don’t forget charts and drawings

Points from your paper

Main points again from your paper

Sub points tabbed in here

Keep these brief

Maybe add pictures or charts

To keep it fresh

And creative

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

6

Important stuff about your company?

Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5

value of the proposed solution

Talk about the value of your proposed solution (Project) and how it will give your company:

A competitive advantage in the market.

The detail is below in the notes section

But this is the important points up here in the bulleted list.

Go on Youtube or LinkedIn Learning if you don’t know Powerpoint.

It’s easy to learn.

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

7

Project Cost

In the real world:

This is the bottom line

Needs to be thorough and clear

Pictures are great

Be POSITIVE!

Spending money is an investment

Be sure and confident

Money is always a picture or chart showing return on investment (ROI)

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

8

Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5

Project Timing

Great place to put your Gantt Chart with an explanation here of how to read it. The more detail here the better, and maybe talk about scope change within the last week or two?

9

Sources:

;laskdjf;alskdfh;a sjdhf lakjsdfhla ksdfl akjsdhflka shdlkf halsdjkf halsj dfhlas dhflak jshdflka jsdhlfk ashd

A; lkdfj;alsd f;alsd kjf;alks jdf;lakjs df;la ksd;f kjas;dlfk ja;sldk f;askd jf;alsk jdf

A;sldkfj ;alskd jf;alskd jf;laks jdf;lak sjdf;lkaj sd;flk ja;sldk jf;a lskdjf;a ksdjf; alkjsd;flkaj s;dlf kj

As;dlkfj a;sldk fj;alskd jf;lakshd f;aljhsd flkajhsd f;lkas dflkj a;sldfjh a;ldskhf ;alskd jf;alsk hg;lakhg

A;sldfkh a;sldjgh ;alskdf h;alsjdgh ;asljfdh ;lasjhdg;lashd;laksh df;lashd f;lashd

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

10

,

Business Requirements

Business Requirements

Project Overview

Ed2Go is an eCommerce company in the education industry that offers unique services and products to target customers worldwide. To help low-income students gain access to higher education, Ed2Go provides innovative services. In order to achieve this strategic objective, a web-based platform must be created and developed so that the target population can access the services. This entails making the product as user-friendly as possible and including all necessary information for the intended audience. The product's flexibility to adapt to client needs is a critical area (1). Ed2Go’s goal is to provide a one-stop-shop of information and resources for high school students looking to attend college. This includes information about schools and other higher education institutions, financial aid, and other forms of guidance.

Functional Business Requirements (Scope) and Scope Control

The project is expected to be finished in 60 days or less, given that all staff members are dedicated and easily accessible to assist with the project. To minimize disturbances and over time, some tasks must be done for hours. Some workers may be asked to work overtime in addition to the hours allotted. The second area of concern is the financial option and how one might use this advantage to produce money with the establishment of a new organization. The results will be carefully explained to all stakeholders who will be present at a subsequent meeting.

The document's task will be to provide an Initial job breakdown structure for the project. The first work breakdown structure for the project includes general training and extra working hours, which are necessary for the installation of software and hardware to workers and management. The Chief Information Officer (CIO) of Ed2Go is in charge of the new infrastructure of both network information systems enterprises in the market place. The CIO’s job is to give accommodations, enhancements, and identity for resources required by hardware or software so that they may be reformed to suit the needs of both customers and the business.

Project Scope Control

The scope of the project includes topics such as testing and training for every system need that is required in each part of the network. To include all the recommendations, the total project will use a similar technique. There will be constraints and assumptions involved. The Projects Schedule will define the constraints and assumptions that will be included in the typical working hours. There should be plans in place for raising more cash to complete further projects. Before any resources are pumped into the projects, all stakeholders must critically assess them; existing projects must be finished before beginning new ones.

Through the integration of modern system operating databases, Wi-Fi systems, data warehousing, cloud computing, and wireless networks, the two companies will be able to view and safeguard their networks. If this project is completed, it will be feasible. Some sectors of the businesses’ stakeholders will be considered for outsourcing and offshore. It will be completed after considering the current situation of financing. It is possible to accomplish this later in the project or throughout the project’s growth stages.

Area

Scope

Incorporation Strategies

Applications

To meet the target production date, only these applications will be implemented: The hardware and software applications will be the priority of the management. The following applications will be incorporated.

Microsoft link, Microsoft office suite, Internet explorer and Microsoft share point.

The applications are going to be installed into the laptops and pcs to ensure they have the network support systems.

Sites

These sites are considered part of the implementation: This project is restructured in a way that it can be in one location or even both according to the results of the finding from cloud sourcing solutions decisions made by the company, management.

Mixture model or on-site solutions or both can be incorporated into the projects which are scheduled of the actual network system without the employees interacting with the daily tasks. All the tools will also be made available for discussions and to debate about them from the supplies to find the right tools and products for the projects

Customization

Customizations will be limited to: making a choice solution that will account for new business approaches in the Cloud technology and virtualization system in the company is Software-as-a-Service (SaaS). The choice solution will act as an alternative for storage of employee’s confidential data and act as software and hardware customization that is available for the users when the time for the project is almost coming to an end.

Project–as-a-service can be used as a different supply database or data to generate stock and reports about all the dealing in the business that are associated with outside world. This will help to disintegrate and identify the sequence and the duration of dependencies of tasks that are yet to implemented in new design. It will also help in identifying new employees who are using network for the purpose of work. Work activity should be put into consideration as far as the project is concerned and not forgetting the different phases that are implemented in the project.

Architecture

Application and technical architecture will include In house solutions and Microsoft applications.

Conversion

All the data in the database will be

considered for conversion.

The data that will be considered for

conversion must be approved by the CIO.

Testing

Testing will include only:

The functionalities of the vital systems

For testing to take place all the network information system that were developed as the project progress and during all the phases of the life cycle of the project must be included. The network includes both emerging companies and that are used for regular basis

Funding

Project funding is limited to: Current Founding

The stake holders might decide to fund the project again with more money which can be used for cloud computing, offshoring and outsourcing. The work needs to be done in more details with approving contractors and providers to determine available products, prices, and additional equipment that are required to complete the job will be described by the Statement of Work schedule

Education

Education will include: Training will be on the processes to ensure that the employees know what they are doing.

The process of training takes place via web application. The topics that all employees should ensure that they go through includes; Ethics, and information security, risk management, patches updates, login and logout. They should also learn the backing up process

Scope Control

Change control will manage changes to the scope identified in this document. Any changes affecting project costs and timelines require business owner approval.

Technical Requirements for Integration of E-commerce Components

All defined standards must be satisfied by hardware, software, and network changes. They must be completely tested and finished within the sixty-day period specified in the contract (2). Employee work interruption will be minimized throughout the project’s merger life cycle. The beginning and conclusion of the initiation life cycle establish the company’s success criterion. The major reason for the merger is to regulate the present structure’s expenditures, keep expenses low, and guarantee that the delivery time of the new systems is raised. A server virtualization may save you money by avoiding the need to acquire new hardware. Another option is to use a bare-bones retail point of sale system and open source to give support for the business’s functioning.

Potential Risks, Constraints, and Assumptions

Risks

The risk that are affecting the progression of the project include;

· Change in the resources

· Change in scope

Risk

Preventative/Mitigating Strategies

Risk #1 Time constraints

Ensure timeliness and follow schedules

Risk #2 Change in scope

Ensure the project is flexible to adopt changes

Constraints

The constrains that were identified in the project are as follows;

· Size of the budget

· Time frame.

Assumptions

The most significant assumptions related to defining this project scope, objectives, and approach scope include:

· The budget will remain accurate.

· The proposed architecture will be completed on time.

· There will be minimal obstacles

Sources

1. Kandemir Dasten. 2022. How can firms locate proactive strategic flexibility in their new product development process?: The effects of market and technological alignment. P.1-26. https://www.tandfonline.com/doi/abs/10.1080/14479338.2021.1952876

2. Khan, D., & Shazia, W. (2019). Cyber security issues and challenges in E-commerce. In Proceedings of 10th international conference on digital strategies for organizational success.

3. Fellah Hadjer. 2020. Mobile Cloud Computing: Architecture, Advantages and Security Issues. P1-9. https://dl.acm.org/doi/abs/10.1145/3386723.3387880

© 2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

Page 1 of 4

,

Project Plan Inception 2

Project Plan Inception 2

Project Plan Inception

Company description

Ed2Go is an eCommerce company in the education industry that offers unique services and products to target customers worldwide. To help low-income students gain access to higher education, Ed2Go provides innovative services. In order to achieve this strategic objective, a web-based platform must be created and developed so that the target population can access the services. This entails making the product as user-friendly as possible and including all necessary information for the intended audience. The product's flexibility to adapt to client needs is a critical area. Ed2Go's goal is to provide a one-stop-shop of information and resources for high school students looking to attend college. This includes information about schools and other higher education institutions, financial aid, and other forms of guidance.

Business type

The company focuses on providing educational services and other services that support education. The company's primary focus is higher learning education, one of the areas in education that are least prioritized in enhancing efficiency and convenience for students to access education. One of the services provided by the company includes lectures and tutorials from lecturers and other experts in different fields. This enables the student to access the learning materials from the comfort of their smartphones or computer systems. The second type of education service provided by the company includes mentor services. This is a result of the vast market gap where many students get confused about the courses to take in higher education institutions, with some ending up choosing courses only to drop out after a few years of learning. In ensuring the problem is addressed, the company offers a platform where a student can engage with a mentor who interacts with the student through the platform and assist the student in making more informed and better decisions. In addition, the services offered by the company include scholarships and links to sponsorships. This service serves more as a social responsibility than a profitable service. The service was created following increased concerns that many students across the world never manage to join the learning institutions of their dreams due to insufficient funds. Also, there are high net worth people with a will to assist needy students, but they lack a link to access the students. This is the gap filled by Ed2Go, where students can apply for available scholarships, and the company to vet the teachers.

Customers

There are three types of customers targeted by the company, all involved in the education sector. The first classification of customers includes students in higher learning institutions such as colleges and universities. These students need learning materials such as tutorials and notes on various subjects and courses learned in higher learning institutions. The second class of customers is mentors. These individuals have excelled in various professions and careers and can guide students. In qualifying for this class of customers, there is a form filled out by the target customer to verify their credibility as a mentor. This is done to enhance the company's ethical standards and ensure the students are guaranteed genuine information. The third class of customers is the sponsors as individuals or organizations that provide scholarships to needy or less privileged students.

Demographics

The company has segmented customers based on income level and interest psychographics. In terms of income, the company focuses on low and middle-class customers. These customers are price-sensitive and prefer purchasing a service or product that offers the lowest price but is worth quality features and offers. This classification fits the students who purchase lecture materials and tutorials from the company and students who apply for scholarships using the eCommerce platform. There are also high-income customers in terms of individuals and organizations. This is used in describing the sponsors and high net worth individuals who provide scholarships through the company (1).

Elements of eCommerce information system infrastructure

Several technologies go into electronic commerce, such as mobile commerce, e-funds transfer, supply chain management, online transaction processing, EDI, inventory management systems, and automated data collection. The World Wide Web is often used at some point in the transaction's life cycle, but it may also include email, mobile devices, social networks, and telephones in modern electronic commerce. E-commerce is widely regarded as the sales part of e-business. Financial and payment parts of a commercial transaction are also part of this process. This is one of the most efficient and successful ways to conduct business and communicate within a company. It is a strategy for entering a new market without having a physical presence there.

Firewalls are another essential part of online business or eCommerce. Firewalls are commonly used to protect network nodes from incoming and outgoing data traffic and specialized applications. To shield the network from external attacks, firewalls employ various technologies, including software, hardware, and cloud services. In order to prevent malicious traffic and data packets from passing through, a firewall must be in place. Using specified security rules, firewalls examine incoming traffic to identify a suspect or unsecured traffic and block it from entering the network. A computer's ports, where information is actually shared with external devices, are protected by security measures (1).

Encryption software is another part of the infrastructure of an e-commerce information system. If you want to keep your digital information safe from prying eyes, you will need encryption software. In addition to protecting digital information stored on computers, cryptography is also used to protect information transmitted via the Internet. Encryption software is available from a variety of sources. A cipher is used to transform the original content into ciphertext, which is then decrypted. To classify this sort of software, the encryption utilized is a good starting point. Both asymmetric and public key ciphers are under the umbrella term "ciphers,". They can be further broken down into two subcategories. Public key or symmetric key encryption can be used for encryption software. Software encryption can also be classified according to the goal it serves. Based on this technique, it is possible to categorize software encryption into "data in transit" and "data at rest". Asymmetric key ciphers are typically used for data in transit and asymmetric key ciphers for data at rest. Block ciphers and stream ciphers are subsets of symmetric key ciphers. stream ciphers are often used to encrypt real-time communications, such as audio or video information, by encrypting plaintext one bit or byte at a time. Plaintext encryption is achieved by decrypting the encrypted data using a keystream generator's output. In the storage stack, encryption can be applied at many levels. It is possible to configure encryption at the disk layer, on a partition of a disk, on a volume that is made up of disks and partitions, in user space applications like databases and other programs that run on the host operating system (2).

When a digital signature is applied to a digital message or document, it creates a unique virtual fingerprint that can be used to identify the sender and protect sensitive information. Emails have a digital signature that includes the content of the message. Compared to other electronic signatures, digital signatures offer much higher levels of security. Proof that a digital communication or document has not been altered after it was signed is how digital signatures functions. Digital signatures accomplish this by encrypting the message or document with the sender's private key and then creating a unique hash. The created hash is specific to the document or content, and any tampering with it results in a new hash. The message or document is signed digitally and transmitted to the receiver upon completion. The recipient then uses the sender's public key to decrypt the sender's hash and decrypts the message or digital document on their own. In order to verify the authenticity of a message or digital document, a recipient generates a unique hash and compares it to the hash generated by the sender (3).

In implementing an efficient information system infrastructure, nine tasks or applications will be made, with each task taking a distinct amount of time. The entire process of developing the eCommerce information system infrastructure and launching various programs is estimated to take one year. Launching the programs can be done through a simulation or cloud process.

Application/Task

Interpretation

App 1

Creating, launching, and evaluating mobile commerce.

App 2

Developing, launching, and testing the electronic transfer of funds system.

App 3

Developing, launching, and testing electronic data interchange.

App 4

Developing a framework for electronic transaction processing.

App 5

Developing internet marketing interventions and evaluating the effectiveness.

Sources

1. Batra, S., & Arora, A. (2020). Adoption of eCommerce in MSME sector. PalArch's Journal of Archaeology of Egypt/Egyptology17(9), 5701-5710.

2. Li, J., Zhang, J., Qu, F., & Zhao, Y. (2018). The Influencing Factors Model of Cross-Border Ecommerce Development: A Theoretical Analysis. In Wuhan International Conference on e-Business. Association For Information Systems.

3. Nik Mahmud, N. N. A., & Othman, A. A. (2020). Effectiveness of e-commerce infrastructure towards purchase intention among STML students in UUM. In Symposium on Technology Management and Logistics (STML Go Green) 2019: Operations Management, Volume 1 (Vol. 1, No. 30, pp. 103-105). Universiti Utara Malaysia.

,

Running Head: SYSTEM IMPLEMENTATION. 1

SYSTEM IMPLEMENTATION 3

System Implementation

Overview

Ed2Go is structured in such a way that it comprises three distinct divisions: the management division, the sales division, and the server/credit division. It is necessary to utilize servers with high-performance physical components to process and store large amounts of data. If a star topology is used, you will be able to control the entirety of the network using just one switch. Because of the simple network design, this makes it much simpler for administrators to troubleshoot any issues that may arise. The administration of star topologies is simple, but the initial investment and ongoing operational costs can be pretty high.

Several items and their prices are listed in the spreadsheet. The Apple store is where we get the laptops and desktops, and we will need five of each. Ed2Go's sales and management teams will both benefit from the new equipment. Tablets will also be required to run the business. The Asus routers will serve as a source of Internet connectivity. There will be a Cisco 9300 Series Firewall and three routers for each department.

1. Logical And Physical Layout Of The Company's Information Systems

For the actual layout, we will go with a star pattern. Each section in the network setup is linked to a point source. The central network hub serves as the server, whereas the other devices are referred to as clients. The root server serves as the network's relay station for all network traffic. Computers in star topologies are connected by coaxial, twisted pair, or optical fiber cables.

A single switch can manage the entire network in a star topology. This allows the network to continue to operate even if a central node fails. As a result, star topologies are more resistant to failures than other topology configurations. A ring topology forces you to take the network offline every time a new computer is added. Star topologies use fewer cables than other topologies in the network's physical structure. This makes troubleshooting much easier for administrators because the overall network design is so straightforward (Andersen, 1).

If a central switch goes down, the entire network will be rendered inoperable. Because of this, the administrator of the system needs to maintain a constant eye on the state of the health of the central node to avoid it from failing. Configurations and performance of the central node are also factors that affect the network's performance. For the most part, Star topologies are straightforward to administer, but the initial investment and ongoing operational costs can be high.

Fig. 1 The Physical layout

Diagram  Description automatically generated

For Ed2Go to run well, it has several departments. The company's physical arrangement is shown in the diagram above. Ed2Go is organized into three divisions: the server/sales division, the sales division, and the management division. The servers and the router are in the server department. Large amounts of data must be processed and stored on servers with high-performance physical components, especially if the hosting is not shared. Because of this, you must consider the amount of physical space allotted to such servers in the facilities.

Laptop computers house the sales team's workstat

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing