isds 351 exam 2 (quiz questions)
Identify the component present in a smart card that can process instructions and store data for use in various applications.
Microchip
Christina has prepared a document that describes detailed information about each WBS item. This document is called a(n) ____
WBS dictionary
the OSI model has _____ layers
7
____ is the number of days or hours of work required to complete a task.
Effort
___ provide a standard format for displaying planned project schedule information.
Gantt charts
The higher levels of the OSI model are more _______ oriented:
Human
A network of physical objects embedded with sensors, processors, software, and network connectivity is called the
Internet of Things
____ uses highly organized and intensive workshops to bring together project stakeholders- the sponsor, users, business analysts, programmers, and so on- to jointly define and design information systems
Joint Application Development (JAD)
Amal has documented all of the conditions or capabilities that must be met by the project or present in the product, service, or result to satisfy an agreement or other formally imposed specification. These are known as
Requirements
What effect does the project's size, complexity, importance, and other factors have on how much effort is spent on collecting requirements for scope planning
Significant effect
A(n) ___ is an element of work that has an expected duration, cost, and resource requirements.
activity
A way of drawing customers to a website is by:
asking them to review a recently purchased item.
Networks are enablers of ___ and ___
business, risk
The goal of defining activities is to ensure that the project team
completely understands all the work it must do as part of the project scope
Networks allow ______ to be moved around for people and business
data
Jorge and his team have subdivided the project deliverables into smaller pieces using a process known as ___.
decomposition
One of PERT's main ______ is that it does not address the risk associated with duration estimates
disadvantages
Creating, reviewing, and approving purchase orders as features of:
e-procurement software
A protocol is a(n)
established standard for behavior
E-commerce has the potential to _____ operating efficiencies.
improve
The project integration management knowledge area maps to the ____ process group through the activities of developing project charters
initiating
A microchip in a smart card stores the same data as the ____ on a payment card
magnetic stripe
A(n) ____ on a project is a significant event that normally has no duration
milestone
The outputs of the ____ process include change request status updates, project management plan updates, and project document updates.
monitoring and controlling
A(n) _______ is a schematic display of the logical relationships amongst project activities and their sequencing.
network diagram
A high percentage of business to business (B2B) transactions take place between companies called:
original equipment manufacturers
Which of the following is used by Europay Mastercard Visa (EMV) transactions to confirm the identity of a card holder?
personal identification number
Buyers need to enter a company's identification code and password to make a purchase from a selection of products at a pre-negotiated price in:
private stores
The ___ section of the project management plan describes how to monitor project process and handle changes
project controls
A ______ is a document used to coordinate all project planning documents and help guide a project's execution and control.
project management plan
a ____ is a document used to coordinate all project planning documents and help guide a project's execution and control
project management plan
A project charter typically authorizes the ______ to use organizational resources to complete the project.
project manager
The project sponsor has state you must have a process to define and control what work is or is not included in a project. To accomplish this, you must plan for _________.
project scope management
Customers fear the misuse of their personal data due to the:
publicity of consumer data breaches
The vice president of your company has requested that you create a table that lists requirements, their various attributes, and the status of the requirements to ensure that all are addressed. This is known as a(n)
requirements traceability matrix
When networks are used for data breaches, malware, and cybercrime they enable____.
risk
A network protocol establishes a set of ___ that govern how devices communicate
rules and definitions
Rihannon needs to define to all the work involved in creating the products of her project and the processes used to create them. She needs to define the project_____
scope
Hue has been asked to increase the scope of a project. Hue is advising the project sponsor that there is a risk of ______.
scope creep
Payback occurs when
the net cumulative benefits equal the net cumulative costs
A(n) ____ is a deliverable oriented grouping of the work involved in a project that defines the total scope of the project.
work breakdown structure
Effort is a measure of ____. Duration is a measure of ____.
work; elapsed time