The()technique involves using project characteristics in a mathematical model to predict total project cost. Models can be simple or complex.
A.costaggregation
B.reserve analysis
C.parametricestimating
D.funding limit reconciliation
您可能感興趣的試卷
- 2009年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2009年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2010年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2010年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2011年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2011年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2012年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
你可能感興趣的試題
An example of scope verification is ().
A.review the performance ofan installed software module
B.managing changes to the project schedule
C.decomposing the WBS to a work package level
D.performing a benefit/cost analysis to determine if we should proceed with the project
Your project is behind schedule due to conflict between team members . Havingresolved the conflict, to get the project back on schedule , you should consider ().
A.crashing the schedule
B.performing resource leveling
C.conducting reverse resource allocation scheduling
D.utilizing the critical chain resources
There are strategies typically deal with threats or risk that may have negative impacts on project objectives if they occur, some other strategies are suggested to deal with risks with potentially positive impacts. ()is a risk response strategy that may be adopted for either threats or opportunities.
A.share
B.Mitigate
C.Transfer
D.Acceptance
Changes may be requested by any stakeholder involved with the project, but changes can be authorized only by()
A.executive IT manager
B.projectmanger
C.change control board
D.projectsponsor
The TCP protocolis a ()layer protocol.
A.physical
B.network
C.transport
D.application
Many of the activities performed during the preliminary investigation are still being conducted in(1),but in much greater depth than before. During this phase, the analyst must become fully aware of the (2) and must develop enough knowledge about the (3)and the existing systems to enable an effective solution to be proposed and implemented. Besides the(4)for process and data of current system, the deliverable from this phase also includes the(5)for the proposed system.
空白(5)處填()
A.hardware and software specification
B.system performance specification
C.formal requirements definition
D.generalproblemstatement
The parties to government procurement refer to the principal entities of all kinds that enjoy rights and undertake obligations in government procurement, including the procuring entities, the ()and the procuring agencies.
A.users
B.servers
C.producers
D.suppliers
Many of the activities performed during the preliminary investigation are still being conducted in(1),but in much greater depth than before. During this phase, the analyst must become fully aware of the (2) and must develop enough knowledge about the (3)and the existing systems to enable an effective solution to be proposed and implemented. Besides the(4)for process and data of current system, the deliverable from this phase also includes the(5)for the proposed system.
空白(2)處填()
A.main symptom
B.rootproblem
C.finalblueprint
D.dataspecification
最新試題
空白(3)處填()
空白(3)處填()
Quality planning tools are often used to help plan effective quality management activities . ()is one of such tools, which involves company actual or planned project practices to those or other projects to generate ideas for improvement and to provide a basis by which to measure performance.
空白(5)處填()
空白(2)處填()
There are strategies typically deal with threats or risk that may have negative impacts on project objectives if they occur, some other strategies are suggested to deal with risks with potentially positive impacts. ()is a risk response strategy that may be adopted for either threats or opportunities.
Contract closeout is a process that involves()
An example of scope verification is ().
Changes may be requested by any stakeholder involved with the project, but changes can be authorized only by()
空白(1)處填()