301- Done SPM

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

____ are often more effective particularly for sensitive information. a.Electronic communications c.Telephone conversations b.Short face-to-face meetings d.Long face-to-face meetings

b

____ involves allocating ownership of the risk to another party. a. risk exploitation b. risk sharing c. risk enhancement d. risk acceptanceb

b

____ involves deciding how to approach and plan the risk management activities for the project. a.Identifying risks b.Planning risk management c.Performing qualitative risk analysis d.Performing quantitative risk analysis

b

____ involves shifting the consequence of a risk and responsibility for its management to a third party. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation

c

There are ____ major processes involved in risk management. a.three b.four c.five d.six

d

____ are/is a qualitative risk analysis tool, and in addition to identifying risks, it maintains an awareness of risks throughout the life of a project. a.Risk factor analysis b.Probability/impact matrices or charts c.Risk registering d.Top Ten Risk Item Tracking

d

The ____ line for any e-mail messages you write should clearly state the intention of the e-mail. a.to c.subject b.from d.cc

c

KLCI Research Group's 2001 survey revealed that ____ percent of the organizations surveyed had a Project Management Office. a.64 b.75 c.85 d.94

a

There are ____ main processes in project communications management. a.two c.four b.three d.five

c

A ____ person achieves a balance between risk and payoff. a.risk-seeking b.risk-averse c.risk-fearing d.risk-neutral

d

According to Thamhain and Wilemon, ____ is the ability to improve a worker's position. a.authority c.expertise b.assignment d.promotion

d

Poor conflict management, poor project organization and definition of responsibilities, and absence of leadership are risk conditions associated with the ____ project management knowledge area. a.Integration b.Quality c.Time d.Human Resources

d

A(n) ____ is a diagramming analysis technique used to help select the best course of action in situations in which future outcomes are uncertain. a.decision tree b.EMV c.Monte Carlo analysis d.watch list

a

According to Thamhain and Wilemon, ____ is the legitimate hierarchical right to issue orders. a.authority c.expertise b.assignment d.promotion

a

According to the guideline governing ____, designate someone to take minutes and send the minutes out soon after the meeting. a.running the meeting professionally b.providing an agenda to participants before the meeting c.determining who should attend the meeting d.building relationships

a

In a risk breakdown structure, competitors, suppliers, and cash flow are categories that fall under ____ risk. a.business b.technical c.organizational d.project management

a

In the Tuckman model, ____ occurs when the emphasis is on reaching the team goals, rather than working on team process. a.performing c.forming b.norming d.storming

a

Project sponsors can usually rank scope, time, and cost goals in order of importance in a(n) ____. a.expectations management matrix c.issue log b.responsibility assignment matrix d.priority matrix

a

____ are a complete set of organized project records that provide an accurate history of the project. a.Project archives c.Project databases b.Project backups d.Project notes

a

____ are developed for risks that have a high impact on meeting project objectives, and are put into effect if attempts to reduce the risk are not effective. a.Fallback plans b.Contingency reserves c.Contingency plans d.Contingency allowances

a

____ describe what the project team has accomplished during a certain period. a.Progress reports c.Forecasts b.Status reports d.Updates

a

____ fill in for project managers in their absence and assist them as needed. a.Deputy project managers c.Assistant project managers b.Subproject managers d.Second-tier project managers

a

____ involves collecting and disseminating performance information, including status reports, progress measurement, and forecasting. a.Reporting performance c.Managing stakeholder expectations b.Distributing information d.Planning communications

a

____ involves determining which risks are likely to affect a project and documenting the characteristics of each. a.Identifying risks b.Planning risk management c.Performing qualitative risk analysis d.Performing quantitative risk analysis

a

____ involves doing whatever you can to make sure the positive risk happens. a.Risk exploitation b.Risk sharing c.Risk enhancement d.Risk acceptance

a

____ involves eliminating a specific threat, usually by eliminating its causes. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation

a

____ involves prioritizing risks based on their probability and impact of occurrence. a.Performing qualitative risk analysis b.Planning risk management c.Planning risk responses d.Performing quantitative risk analysis

a

____ refers to the amount of individual resources an existing schedule requires during specific time periods. a.Resource loading c.Resource allocation b.Resource leveling d.Resource requesting

a

A(n) ____ is a column chart that shows the number of resources assigned to a project over time. a.responsibility assignment matrix c.RACI charts b.resource histogram d.organizational breakdown structure

b

A(n) ____ represents decision problems by displaying essential elements, including decisions, uncertainties, causality, and objectives, and how they influence each other. a.risk breakdown structure b.influence diagram c.process flow chart d.system flow chart

b

According to the guideline governing ____, many meetings are most effective with the minimum number of participants possible. a.determining if a meeting can be avoided b.determining who should attend the meeting c.defining the purpose and intended outcome of the meeting d.running the meeting professionally

b

According to the guidelines provided by Practical Communications, Inc., a(n) ____ is the only method that is "excellent" for encouraging creative thinking. a.phone call c.meeting b.e-mail d.Web Site

b

Many users prefer ____ to learn how to use a new system. a.phone conversations c.e-mail conversations b.face-to-face meetings d.reading user guides

b

People who believe in ____ assume that the average worker wants to be directed and prefers to avoid responsibility. a.Theory W c.Theory Y b.Theory X d.Theory Z

b

Utility rises at a decreasing rate for a ____ person. a.risk-seeking b.risk-averse c.risk-neutral d.risk-indifferent

b

When using the ____, project managers retreat or withdraw from an actual or potential disagreement. a.confrontation mode c.smoothing mode b.withdrawal mode d.forcing mode

b

Which of Covey's habits does Douglas Ross suggest differentiates good project managers from average or poor project managers? a.Think win/win b.Seek first to understand, then to be understood c.Begin with the end in mind d.Synergize

b

With the ____, project managers use a give-and-take approach to resolving conflicts. a.confrontation mode c.smoothing mode b.compromise mode d.forcing mode

b

____ applies to positive risks when the project team cannot or chooses not to take any actions toward a risk. a. risk enhancement b. risk acceptance c. risk sharing d. risk exploitation

b

____ involves making needed information available to project stakeholders in a timely manner. a.Reporting performance c.Managing stakeholder expectations b.Distributing information d.Planning communications

b

____ involves taking steps to enhance opportunities and reduce threats to meeting project objectives. a.Performing quantitative risk analysis b.Planning risk responses c.Monitoring and controlling risk d.Performing qualitative risk analysis

b

____ involves using punishment, threats, or other negative approaches to get people to do things they do not want to do. a.Legitimate power c.Reward power b.Coercive power d.Referent power

b

____ is a technique for resolving resource conflicts by delaying tasks. a.Resource loading c.Resource allocation b.Resource leveling d.Resource requesting

b

A project manager can chart the probability and impact of risks on a ____. a.risk ranking chart b.risk probability table c.probability/impact matrix d.risk assessment matrix

c

According to the guidelines provided by Practical Communications, Inc., a(n) ____ is the most appropriate method for giving complex instructions. a.phone call c.meeting b.e-mail d.Web Site

c

Psychologist David Merril describes ____ as reactive and task-oriented. a."Expressives" c."Analyticals" b."Drivers" d."Amiables"

c

Research indicates that project managers favor using ____ for conflict resolution over the other four modes. a.compromise c.confrontation b.smoothing d.forcing

c

Since information technology projects often require a lot of coordination, it is a good idea to have ____ meetings. a.long, frequent c.short, frequent b.short, infrequent d.long, infrequent

c

The ____ presents subjects with a series of ambiguous pictures and asks them to develop a spontaneous story for each picture, assuming they will project their own needs into the story. a.RAM c.TAT b.MBTI d.RACI

c

What is the first step in a Monte Carlo analysis? a. Determine the probability distribution of each variable. b. For each variable, such as the time estimate for a task, select a random value based on the probability distribution for the occurrence of the variable. c. Assess the range for the variables being considered. d. Run a deterministic analysis or one pass through the model using the combination of values selected for each one of the variables.

c

William Ibbs and Young H. Kwak's study revealed that the ____ industry had the lowest level of project management maturity in the area of quality management. a.engineering/construction b.telecommunications c.information systems d.high-tech manufacturing

c

____ are predefined actions that the project team will take if an identified risk event occurs. a.Fallback plans b.Contingency reserves c.Contingency plans d.Contingency allowances

c

____ involves changing the size of the opportunity by identifying and maximizing key drivers of the positive risk. a. risk exploitation b. risk sharing c. risk enhancement d. risk acceptance

c

____ involves monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project. a.Performing quantitative risk analysis b.Planning risk responses c.Monitoring and controlling risk d.Performing qualitative risk analysis

c

____ predict future project status and progress based on past information and trends. a.Progress reports c.Forecasts b.Status reports d.Updates

c

"If the information technology project is to produce a new product or service, will it be useful to the organization or marketable to others?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.Market risk

d

"Is there a project champion?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.People risk

d

According to the Standish Group's success potential scoring sheet, ____ has the highest relative importance. a.executive management support b.clear statement of requirements c.proper planning d.user involvement

d

According to the guidelines provided by Practical Communications, Inc., a(n) ____ is the only inappropriate method for expressing support/appreciation. a.phone call c.meeting b.e-mail d.Web site

d

As the number of people involved in a project ____, the complexity of communications ____. a.increases, decreases c.increases, stays constant b.decreases, increases d.increases, increases

d

In the MBTI, the ____ dimension relates to the manner in which you gather information. a.Extrovert/Introvert c.Judgment/Perception b.Thinking/Feeling d.Sensation/Intuition

d

In the Tuckman model, ____ occurs as team members have different opinions as to how the team should operate. a.performing c.forming b.norming d.storming

d

Often, many non-technical professionals—from colleagues to managers—prefer to ____ about project information to try to find pertinent information. a.read detailed reports c.read Web pages b.read e-mails d.have a two-way conversation

d

Some items discussed in a(n) ____ include reflections on whether project goals were met, whether the project was successful or not, the causes of variances on the project, the reasoning behind corrective actions chosen, the use of different project management tools and techniques, and personal words of wisdom based on team members' experiences. a.final project report c.audit report b.design document d.lessons-learned report

d

The output of the ____ process is a communications management plan. a.reporting performance c.managing stakeholder expectations b.distributing information d.planning communications

d

When using the ____, project managers exert their viewpoint at the potential expense of another viewpoint. a.confrontation mode c.smoothing mode b.compromise mode d.forcing mode

d

____ involves determining the information and communications needs of the stakeholders. a.Reporting performance c.Managing stakeholder expectations b.Distributing information d.Planning communications

d

____ involves numerically estimating the effects of risks on project objectives. a.Performing qualitative risk analysis b.Planning risk responses c.Planning risk management d.Performing quantitative risk analysis

d

The ____ mode is also called the problem-solving mode. a.confrontation c.smoothing b.compromise d.forcing

a

The ____ serves as a good starting point for information distribution. a.stakeholder communications analysis c.communications management plan b.WBS d.status report

a

Those who are ____ have a higher tolerance for risk, and their satisfaction increases when more payoff is at stake. a.risk-seeking b.risk-averse c.risk-neutral d.risk-indifferent

a

____ describe where the project stands at a specific point in time. a.Progress reports c.Forecasts b.Status reports d.Updates

b

Four people have ____ communications channel(s). a.one c.six b.four d.eight

c

Information regarding the content of essential project communications comes from the ____. a.organizational chart c.work breakdown structure (WBS) b.communications management plan d.expectations management matrix

c

It takes ____ to help improve communication. a.timing c.leadership b.highly skilled employees d.outside consultants

c

KLCI Research Group's 2001 survey revealed that ____ percent of the participants said they had procedures in place to identify and assess risk. a.75 b.87 c.97 d.99

c

Many people cite research that says in a face-to-face interaction, ____ percent of communication is through body language. a.10 c.58 b.25 d.85

c

Many practitioners define project success as ____. a.meeting project scope goals c.satisfying the customer/sponsor b.meeting time goals d.meeting cost goals

c

Unenforceable conditions or contract clauses, and adversarial relations are risk conditions associated with the ____ project management knowledge area. a.Integration b.Quality c.Procurement d.Human Resources

c

When using the ____, the project manager deemphasizes or avoids areas of differences and emphasizes areas of agreement. a.confrontation mode c.smoothing mode b.withdrawal mode d.forcing mode

c

William Ibbs and Young H. Kwak's study revealed that the ____ industry had the lowest level of project management maturity in the area of risk management. a.engineering/construction b.telecommunications c.information systems d.high-tech manufacturing

c

____ analysis simulates a model's outcome many times to provide a statistical distribution of the calculated results. a.Decision tree b.EMV c.Monte Carlo d.Watch list

c

KLCI Research Group's 2001 survey revealed that the most frequently cited benefit from software risk management practices is to ____. a.prevent surprises b.improve ability to negotiate c.meet customer commitments d.anticipate/avoid problems

d

____ emphasizes things such as job rotation, broadening of skills, generalization versus specialization, and the need for continuous training of workers. a.Theory W c.Theory Y b.Theory X d.Theory Z

d

____ is based on an individual's personal charisma. a.Legitimate power c.Reward power b.Coercive power d.Referent power

d

"Will the project meet NPV, ROI, and payback estimates?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.Market risk

a

The communications management plan can be part of the team ____. a.WBS c.plan b.contract d.guidelines

b

KLCI Research Group's 2001 survey revealed that ____ percent identified anticipating and avoiding problems as the primary benefit of risk management. a.60 c.89 b.80 d.99

b

____ employees are also more likely to enroll voluntarily in classes on the latest technology than those on developing their soft skills. a.Individual c.Groups of b.Service d.Team

a

The first step in the framework for defining and assigning work is ____. a.defining how the work will be accomplished b.breaking down the work into manageable elements c.finalizing the project requirements d.assigning work responsibilities

c

Psychologist David Merril describes ____ as reactive and people-oriented. a."Expressives" c."Analyticals" b."Drivers" d."Amiables"

d

Having ____ review and approve all stakeholder communications analysis will ensure that the information is correct and useful. a.stakeholders c.top management b.project team members d.customers

a

Two people have ____ communications channel(s). a.zero c.two b.one d.three

b

____ involves using incentives to induce people to do things. a.Legitimate power c.Reward power b.Coercive power d.Referent power

c

____ are a good way to highlight information provided in important project documents, empower people to be accountable for their work, and have face-to-face discussions about important project issues. a.Information retreats c.Information review meetings b.Status planning meetings d.Status review meetings

d

____ involves reducing the impact of a risk event by reducing the probability of its occurrence. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation

d

____ is a fact-finding technique for collecting information in face-to-face, phone, e-mail, or instant-messaging discussions. a.Brainstorming b.SWOT analysis c.The Delphi technique d.Interviewing

d

____ is best known for developing Theory X and Theory Y. a.Frederick Herzberg c.Abraham Maslow b.David McClelland d.Douglas McGregor

d

____ is matching certain behaviors of the other person. a.Empathic listening c.Synergy b.Rapport d.Mirroring

d

____ issues cause the most conflicts over the project life cycle. a.Project priority c.Cost b.Staffing d.Schedule

d


Kaugnay na mga set ng pag-aaral

4 Rule Britannia! The English Empire, 1660-1763

View Set

Benefits of Cardiovascular Training

View Set

Ethical Hacking and Network Defense

View Set

Abeka 7th Grade Science, Section 7.5 Bold Terms

View Set