Changes may be requested by any stakeholder involved with the project, but changes can be authorized only by()
A.executive IT manager
B.projectmanger
C.change control board
D.projectsponsor
您可能感興趣的試卷
- 2009年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2009年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2010年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2010年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2011年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2011年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2012年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
你可能感興趣的試題
A.PERT
B.Resourceleveling
C.Schedulecompression
D.Critical chain method
Project schedule management is made up of six management processes including: activity definition, activity sequencing()and schedule control by order.
A.activity duration estimating, schedule developing, activity resource estimating
B.activity resource estimating, activity duration estimating, schedule development
C.schedule developing, activity resource estimating, activity duration estimating
D.activity resource estimating, schedule developing, activity duration estimating
The creation ofa work breakdown structure (WBS) is the process of()the major project deliverables.
A.subdividing
B.assessing
C.planning
D.integrating
The Unified Modeling Language is a standard graphical language for modeling object-oriented software()can show the behavior of systems in terms of how objects interact with each other.
A.Classdiagram
B.Componentdiagram
C.Sequencediagram
D.Use case diagram
()is a property of object-oriented software by which an abstract operation may be performed in different ways in different classes.
A.Method
B.Polymorphism
C.Inheritance
D.Encapsulation
The strategies for handling risk comprise of two main types: negative risks, and positive risks. The goal ofthe plan is to minimize threats and maximize opportunities. When dealing with negative risks, there are three main response strategies(),rransfer ,Mitigate.
A.Challenge
B.Exploit
C.Avoid
D.Enhance
The ()process ascertains which risks have the potential of affecting the project and documenting the risks' characteristics.
A.Riskldentification
B.Quantitative Risk Analysis
C.Qualitative Risk Analysis
D.Risk Monitoring and Control
Developing the project schedule is often an iterative process. It determines the planned start and finish dates for project activities and milestones. Schedule development can require the review and revision of duration estimates and resource estimates to create an approved project schedule that can serve as a baseline to()progress.
A.analyze
B.track
C.level
D.extend
Estimating activity durations uses information on activity scope of(),required resource types, estimated resource quantities, and resource calendars.
A.milestone
B.baseline
C.quality
D.work
Project work packages are typically decomposed into smaller components called activities to provide a basis for()scheduling, executing, and monitoring and controllingthe proj ect work.
A.reviewing
B.estimating
C.auditing
D.expecting
最新試題
空白(2)處填()
Creating WBS means subdividing the major project deliverables into smaller components until the deliverables are defined to the level()
Project selection methods involve measuring value or attractiveness to the project owner or sponsor and may include other organizational decision criteria ()is not a project selection method.
空白(2)處填()
The TCP protocolis a ()layer protocol.
空白(2)處填()
Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes.()is not a project configuration management tool.
The parties to government procurement refer to the principal entities of all kinds that enjoy rights and undertake obligations in government procurement, including the procuring entities, the ()and the procuring agencies.
In which form of projects origination would the project manager be likely to exercise the most control over Project resources.()
空白(1)處填()