SWM301_P15
b
An October 2005 Information Technology Association of America (ITAA)-sponsored report stated that spending for global sources of computer software and services is expected to grow at a compound annual rate of about ____ percent. a. 10 b. 20 c. 30 d. 40
b
Buyers typically develop a short list of the top ____ suppliers to reduce the work involved in selecting a source. a. one to two b. three to five c. eight to ten d. twelve to fifteen
a
For many projects, properly ____ some information technology functions can be a great investment. a. outsourcing b. scaling c. increasing d. planning
c
From the supplier's perspective, there is the least risk with a(n) ____ contract a. CPFF b. FFP c. CPPC d. CPFF
a
In a risk breakdown structure, competitors, suppliers, and cash flow are categories that fall under ____ risk. a.business b.technical c.organizational d.project management
b
Outputs to the ____ process include selected sellers, procurement contract awards, resource calendars, change requests, and updates to the project management plan and other project documents. a. Closing the contract b. Conducting procurements c. Requesting seller responses d. Administering the contract
d
Poor conflict management, poor project organization and definition of responsibilities, and absence of leadership are risk conditions associated with the ____ project management knowledge area. a.Integration b.Quality c.Time d.Human Resources
d
The ____ is a description of the work required for the procurement. a. RFQ b. RFP c. COW d. SOW
c
Unenforceable conditions or contract clauses, and adversarial relations are risk conditions associated with the ____ project management knowledge area. a.Integration b.Quality c.Procurement d.Human Resources
b
With a(n) ____ contract, the buyer pays the supplier for allowable performance costs along with a predetermined fee and an incentive bonus. a. CPFF b. CPIF c. CPPC d. CPPF
d
____ are/is a qualitative risk analysis tool, and in addition to identifying risks, it maintains an awareness of risks throughout the life of a project. a.Risk factor analysis b.Probability/impact matrices or charts c.Risk registering d.Top Ten Risk Item Tracking
b
____ change orders are oral or written acts or omissions by someone with actual or apparent authority that can be construed to have the same effect as a written change order. a. Direct b. Constructive c. Destructive d. Instructive
b
____ contracts involve a fixed total price for a well-defined product or service. a. CPFF b. Lump sum c. Cost-reimbursable d. Time and material
c
____ involve payment to the supplier for direct and indirect actual costs. a. CPFF contracts b. Lump sum contracts c. Cost-reimbursable contracts d. Time and material contracts
b
____ involves allocating ownership of the risk to another party. a. risk exploitation b. risk sharing c. risk enhancement d. risk acceptanceb
c
____ involves changing the size of the opportunity by identifying and maximizing key drivers of the positive risk. a. risk exploitation b. risk sharing c. risk enhancement d. risk acceptance
c
____ involves completion and settlement of each contract, including resolution of any open items. a. Exiting procurements b. Closing out accounts c. Closing procurements d. Ending procurements
d
____ involves determining what to procure, when, and how. a. Planning contracting b. Administrating procurements c. Conducting procurements d. Planning procurements
a
____ involves eliminating a specific threat, usually by eliminating its causes. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation
d
____ involves managing relationships with sellers, monitoring contract performance, and making changes as needed. a. Closing procurements b. Selecting sellers c. Requesting seller responses d. Administering procurements
a
____ involves obtaining seller responses, selecting sellers, and awarding contracts. a. Conducting procurements b. Selecting sellers c. Requesting seller responses d. Planning purchases and acquisitions
d
____ involves reducing the impact of a risk event by reducing the probability of its occurrence. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation
c
____ involves shifting the consequence of a risk and responsibility for its management to a third party. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation
d
____ is a fact-finding technique for collecting information in face-to-face, phone, e-mail, or instant-messaging discussions. a.Brainstorming b.SWOT analysis c.The Delphi technique d.Interviewing
c
____ risks are a direct result of implementing a risk response. a. Primary b. Tertiary c. Secondary d. Residual
b
An October 2005 Information Technology Association of America (ITAA)-sponsored report stated that total savings from offshore resources during the 2005-2010 period are estimated to grow from $8.7 billion to ____. a. $10.2 billion b. $20.4 billion c. $50.4 billion d. $107.9 billion
c
What is the first step in a Monte Carlo analysis? a. Determine the probability distribution of each variable. b. For each variable, such as the time estimate for a task, select a random value based on the probability distribution for the occurrence of the variable. c. Assess the range for the variables being considered. d. Run a deterministic analysis or one pass through the model using the combination of values selected for each one of the variables.
c
With a(n) ____ contract, the buyer pays the supplier for allowable performance costs along with a predetermined percentage based on total costs. a. CPFF b. CPIF c. CPPC d. CPPF
a
With a(n) ____ contract, the buyer pays the supplier for allowable performance costs plus a fixed fee payment usually based on a percentage of estimated costs. a. CPFF b. CPIF c. CPPC d. CPPF
c
____ analysis simulates a model's outcome many times to provide a statistical distribution of the calculated results. a.Decision tree b.EMV c.Monte Carlo d.Watch list
b
____ applies to positive risks when the project team cannot or chooses not to take any actions toward a risk. a. risk enhancement b. risk acceptance c. risk sharing d. risk exploitation
a
A(n) ____ is a diagramming analysis technique used to help select the best course of action in situations in which future outcomes are uncertain. a.decision tree b.EMV c.Monte Carlo analysis d.watch list
a
A(n) ____ is a document used to solicit quotes or bids from prospective suppliers. a. RFQ b. RFP c. COW d. SOW
b
A(n) ____ represents decision problems by displaying essential elements, including decisions, uncertainties, causality, and objectives, and how they influence each other. a.risk breakdown structure b.influence diagram c.process flow chart d.system flow chart
d
"If the information technology project is to produce a new product or service, will it be useful to the organization or marketable to others?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.Market risk
d
"Is there a project champion?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.People risk
d
"Most organizations are not in business to provide information technology services, yet many have spent valuable time and resources on information technology functions when they should have focused on core competencies such as marketing, customer service, and new product design." refers to the ____ benefit of outsourcing. a. Reduce both fixed and recurrent costs b. Provide flexibility c. Access skills and technologies d. Allow the client organization to focus on its core business
c
"Organizations can gain access to specific skills and technologies when they are required by using outside resources." refers to the ____ benefit of outsourcing. a. Reduce both fixed and recurrent costs b. Provide flexibility c. Access skills and technologies d. Allow the client organization to focus on its core business
a
"Will the project meet NPV, ROI, and payback estimates?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.Market risk
d
Many organizations use ____ and templates to generate SOWs. a. details b. outlines c. plans d. samples
a
____ involves doing whatever you can to make sure the positive risk happens. a.Risk exploitation b.Risk sharing c.Risk enhancement d.Risk acceptance
a
"Outsourcing suppliers are often able to use economies of scale that may not be available to the client alone, especially for hardware and software." refers to the ____ benefit of outsourcing. a. Reduce both fixed and recurrent costs b. Allow the client organization to focus on its core business c. Access skills and technologies d. Provide flexibility
b
"Outsourcing to provide extra staff during periods of peak workloads can be much more economical than trying to staff entire projects with internal resources." refers to the ____ benefit. a. Reduce both fixed and recurrent costs b. Provide flexibility c. Access skills and technologies d. Allow the client organization to focus on its core business
c
A project manager can chart the probability and impact of risks on a ____. a.risk ranking chart b.risk probability table c.probability/impact matrix d.risk assessment matrix
b
A(n) ____ is a document used to solicit proposals from prospective suppliers. a. RFQ b. RFP c. COW d. SOW
b
There are ____ main processes of project procurement management a. three b. four c. five d. six