The___ is an information gathering technique used as a way to reach an unbiased
consensus of experts on a list of project risks. Project risk experts participate
anonymously.
- team management technique
- delphi technique
- sensitivity technique
- none of the above
Give this one a try later!
, delphi technique
Risk___ is changing the project plan to eliminate the threat entirely. Clarifying
requirements, obtaining information, improving communication, and acquiring
expertise can still help this strategy.
- avoidance
- qualitative analysis
- human resource management planning
- none of the above
Give this one a try later!
avoidance
In Precedence Diagramming Method is the most commonly used type of Precedence
relationship?
- Discretionary Dependencies
- External Dependencies
- Finish to start
- Leads and Lags
Give this one a try later!
Finish to start
The key benefit of this process is it ensures that the degree, type, and visibility of risk
management are commensurate with both the risks and the importance of the project
to the organization
- project management plan
, - plan risk management
- sensitivity management plan
Give this one a try later!
plan risk management
The process of developing an approximation of the monetary resources needed to
complete project activities is
- activity cost estimating
-activity efficiency estimating
- activity variance estimating
- all of the above
Give this one a try later!
Activity costing system
__ should be fully documented since they can create arbitrary total float values and
can limit later scheduling options. These are sometimes referred to as preferred logic,
preferential logic, or soft logic
- bottom up estimating
- leads and lags
- discretionary dependencies
Give this one a try later!
Discretionary dependenceies
consensus of experts on a list of project risks. Project risk experts participate
anonymously.
- team management technique
- delphi technique
- sensitivity technique
- none of the above
Give this one a try later!
, delphi technique
Risk___ is changing the project plan to eliminate the threat entirely. Clarifying
requirements, obtaining information, improving communication, and acquiring
expertise can still help this strategy.
- avoidance
- qualitative analysis
- human resource management planning
- none of the above
Give this one a try later!
avoidance
In Precedence Diagramming Method is the most commonly used type of Precedence
relationship?
- Discretionary Dependencies
- External Dependencies
- Finish to start
- Leads and Lags
Give this one a try later!
Finish to start
The key benefit of this process is it ensures that the degree, type, and visibility of risk
management are commensurate with both the risks and the importance of the project
to the organization
- project management plan
, - plan risk management
- sensitivity management plan
Give this one a try later!
plan risk management
The process of developing an approximation of the monetary resources needed to
complete project activities is
- activity cost estimating
-activity efficiency estimating
- activity variance estimating
- all of the above
Give this one a try later!
Activity costing system
__ should be fully documented since they can create arbitrary total float values and
can limit later scheduling options. These are sometimes referred to as preferred logic,
preferential logic, or soft logic
- bottom up estimating
- leads and lags
- discretionary dependencies
Give this one a try later!
Discretionary dependenceies