Creating WBS means subdividing the major project deliverables into smaller components until the deliverables are defined to the level()
A.independentresource
B.individualworkload
C.workmilestone
D.workpackage
您可能感興趣的試卷
- 2009年計(jì)算機(jī)技術(shù)與軟件專業(yè)技術(shù)資格高級(jí)信息系統(tǒng)項(xiàng)目管理師上半年上午試卷
- 2009年計(jì)算機(jī)技術(shù)與軟件專業(yè)技術(shù)資格高級(jí)信息系統(tǒng)項(xiàng)目管理師下半年上午試卷
- 2010年計(jì)算機(jī)技術(shù)與軟件專業(yè)技術(shù)資格高級(jí)信息系統(tǒng)項(xiàng)目管理師上半年上午試卷
- 2010年計(jì)算機(jī)技術(shù)與軟件專業(yè)技術(shù)資格高級(jí)信息系統(tǒng)項(xiàng)目管理師下半年上午試卷
- 2011年計(jì)算機(jī)技術(shù)與軟件專業(yè)技術(shù)資格高級(jí)信息系統(tǒng)項(xiàng)目管理師上半年上午試卷
- 2011年計(jì)算機(jī)技術(shù)與軟件專業(yè)技術(shù)資格高級(jí)信息系統(tǒng)項(xiàng)目管理師下半年上午試卷
- 2012年計(jì)算機(jī)技術(shù)與軟件專業(yè)技術(shù)資格高級(jí)信息系統(tǒng)項(xiàng)目管理師上半年上午試卷
你可能感興趣的試題
Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes.()is not a project configuration management tool.
A.RationalClearcase
B.QualityFunctionDeployment
C.VisualSourceSafe
D.ConcurrentVersions System
Changes may be requested by any stakeholder involved with the project, but changes can be authorized only by()
A.executive IT manager
B.projectmanger
C.change control board
D.projectsponsor
A.PERT
B.Resourceleveling
C.Schedulecompression
D.Critical chain method
Project schedule management is made up of six management processes including: activity definition, activity sequencing()and schedule control by order.
A.activity duration estimating, schedule developing, activity resource estimating
B.activity resource estimating, activity duration estimating, schedule development
C.schedule developing, activity resource estimating, activity duration estimating
D.activity resource estimating, schedule developing, activity duration estimating
The creation ofa work breakdown structure (WBS) is the process of()the major project deliverables.
A.subdividing
B.assessing
C.planning
D.integrating
最新試題
In which form of projects origination would the project manager be likely to exercise the most control over Project resources.()
There are strategies typically deal with threats or risk that may have negative impacts on project objectives if they occur, some other strategies are suggested to deal with risks with potentially positive impacts. ()is a risk response strategy that may be adopted for either threats or opportunities.
Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes.()is not a project configuration management tool.
An example of scope verification is ().
空白(3)處填()
空白(1)處填()
空白(5)處填()
空白(1)處填()
空白(3)處填()
The connection between two networks from an intemet is handled by a machine known as a()