All of the following are true regarding configuration management except:
A. Requires all acceptance decisions to be made through the CCB
B. Serves as a change control system
C. Describes the physical characteristics of the product of the project
D. Controls changes to the characteristics of an item or system
No Answer is Posted For this Question
Be the First to Post Answer
Information-gathering techniques used in the Risk Identification process include all of the following except: A. Brainstorming B. Delphi technique C. Interviewing D. Kaizen technique
You are a project manager for the information technology division of a local satellite TV broadcasting company. This spring, the chief information officer for your company gave you the project to convert and upgrade all the PCs in the department to the latest release of a specific desktop application. Prior to this conversion, all manner of desktop software existed on machines throughout the company and had caused increasing problems with sharing files and information across the company. A lot of unproductive hours were spent typing information into several formats. This project came about as a result of which of the following? A. Technological advance B. Business need C. Customer request D. Legal requirement
Name the ethical code you'll be required to adhere to as a PMP. A. Project Management Policy and Ethics Guide B. Project Management Professional Standards and Ethics C. Project Management Code of Professional Ethics D. Project Management Professional Code of Professional Conduct
Which of the following is true regarding constraints and assumptions? A. Constraints restrict the actions of the project team, and assumptions are considered true for planning purposes. B. Constraints are considered true for planning purposes, and assumptions limit the options of the project team. C. Constraints consider vendor availability and resource availability to be true for planning purposes. Assumptions limit the project teamwork within predefined budgets or time lines. D. Constraints and assumptions are inputs to the Initiation process. They should be documented, as they will be used throughout the project Planning process.
Which of the following describes the Executing process? A. Project plans are put into action. B. Project performance measurements are taken and analyzed. C. Project plans are developed. D. Project plans are published.
Which of the following is true regarding the critical path? A. It should never be compressed. B. It allows for looping and branching. C. The critical path technique is the same as PERT. D. It's the duration of all tasks with zero float.
What is the difference between direct and indirect measures?
Project managers have the highest level of authority and the most power in which type of organizational structure? A. Projectized B. Strong matrix C. Functional D. Balanced matrix
You are a project manager for Pizza Direct, which is a retail pizza delivery store. Your company is competing with another retail store for the option of opening two new stores in a foreign country. You have been invited to dinner with the prospective foreign business partners and their spouses upon your arrival. You know that all of the following are generally true except: A. You should spend time building relationships with your prospective foreign business partners before getting down to business. B. You should explain your company's rules, standards, and operating policies at your first meeting with the prospective foreign business partners. C. You should build an atmosphere of mutual trust and cooperation. D. You should respect the cultural differences you'll encounter when working with your prospective foreign business partners.
Project selection criteria might include: A. Benefit measurement methods B. Constrained optimization analysis C. NPV calculations D. Potential market share or increased public perception
Explain the meaning of management.
0 Answers Mahatma Gandhi University,
You are the project manager for a new website for the local zoo. You need to perform Quantitative Risk Analysis. You'll use all of the following tools and techniques to accomplish this except: A. Data precision ranking B. Sensitivity analysis C. Decision tree analysis D. Interviewing