SWM (End)

Ace your homework & exams now with Quizwiz!

c

____ involves shifting the consequence of a risk and responsibility for its management to a third party. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation

c

According to the guidelines provided by Practical Communications, Inc., a(n) ____ is the most appropriate method for giving complex instructions. a.phone call c.meeting b.e-mail d.Web Site

c

What is the first step in a Monte Carlo analysis?

b

According to the guideline governing ____, many meetings are most effective with the minimum number of participants possible. a.determining if a meeting can be avoided b.determining who should attend the meeting c.defining the purpose and intended outcome of the meeting d.running the meeting professionally

b

According to the guidelines provided by Practical Communications, Inc., a(n) ____ is the only method that is "excellent" for encouraging creative thinking. a.phone call c.meeting b.e-mail d.Web Site

b

An October 2005 Information Technology Association of America (ITAA)-sponsored report stated that spending for global sources of computer software and services is expected to grow at a compound annual rate of about ____ percent. a. 10 b. 20 c. 30 d. 40

d

As the number of people involved in a project ____, the complexity of communications ____. a.increases, decreases c.increases, stays constant b.decreases, increases d.increases, increases

c

From the supplier's perspective, there is the least risk with a(n) ____ contract a. CPFF b. FFP c. CPPC d. CPFF

b

KLCI Research Group's 2001 survey revealed that ____ percent identified anticipating and avoiding problems as the primary benefit of risk management. a.60 c.89 b.80 d.99

a

KLCI Research Group's 2001 survey revealed that ____ percent of the organizations surveyed had a Project Management Office. a.64 b.75 c.85 d.94

c

KLCI Research Group's 2001 survey revealed that ____ percent of the participants said they had procedures in place to identify and assess risk. a.75 b.87 c.97 d.99

d

KLCI Research Group's 2001 survey revealed that the most frequently cited benefit from software risk management practices is to ____. a.prevent surprises b.improve ability to negotiate c.meet customer commitments d.anticipate/avoid problems

c

Many people cite research that says in a face-to-face interaction, ____ percent of communication is through body language. a.10 c.58 b.25 d.85

c

Many practitioners define project success as ____. a.meeting project scope goals c.satisfying the customer/sponsor b.meeting time goals d.meeting cost goals

b

Many users prefer ____ to learn how to use a new system. a.phone conversations c.e-mail conversations b.face-to-face meetings d.reading user guides

c

Unenforceable conditions or contract clauses, and adversarial relations are risk conditions associated with the ____ project management knowledge area. a.Integration b.Quality c.Procurement d.Human Resources

b

____ are often more effective particularly for sensitive information. a.Electronic communications c.Telephone conversations b.Short face-to-face meetings d.Long face-to-face meetings

c

____ are predefined actions that the project team will take if an identified risk event occurs. a.Fallback plans b.Contingency reserves c.Contingency plans d.Contingency allowances

b

____ describe where the project stands at a specific point in time. a.Progress reports c.Forecasts b.Status reports d.Updates

a

____ employees are also more likely to enroll voluntarily in classes on the latest technology than those on developing their soft skills. a.Individual c.Groups of b.Service d.Team

c

____ involve payment to the supplier for direct and indirect actual costs. a. CPFF contracts b. Lump sum contracts c. Cost-reimbursable contracts d. Time and material contracts

b

____ involves allocating ownership of the risk to another party. a. risk exploitation b. risk sharing c. risk enhancement d. risk acceptanceb

c

____ involves changing the size of the opportunity by identifying and maximizing key drivers of the positive risk. a. risk exploitation b. risk sharing c. risk enhancement d. risk acceptance

c

____ involves completion and settlement of each contract, including resolution of any open items. a. Exiting procurements b. Closing out accounts c. Closing procurements d. Ending procurements

a

____ involves eliminating a specific threat, usually by eliminating its causes. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation

d

____ involves managing relationships with sellers, monitoring contract performance, and making changes as needed. a. Closing procurements b. Selecting sellers c. Requesting seller responses d. Administering procurements

c

____ involves monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project. a.Performing quantitative risk analysis b.Planning risk responses c.Monitoring and controlling risk d.Performing qualitative risk analysis

d

____ involves numerically estimating the effects of risks on project objectives. a.Performing qualitative risk analysis b.Planning risk responses c.Planning risk management d.Performing quantitative risk analysis

a

____ involves obtaining seller responses, selecting sellers, and awarding contracts. a. Conducting procurements b. Selecting sellers c. Requesting seller responses d. Planning purchases and acquisitions

a

____ involves prioritizing risks based on their probability and impact of occurrence. a.Performing qualitative risk analysis b.Planning risk management c.Planning risk responses d.Performing quantitative risk analysis

d

____ involves reducing the impact of a risk event by reducing the probability of its occurrence. a.Risk avoidance b.Risk acceptance c.Risk transference d.Risk mitigation

d

____ is a fact-finding technique for collecting information in face-to-face, phone, e-mail, or instant-messaging discussions. a.Brainstorming b.SWOT analysis c.The Delphi technique d.Interviewing

c

____ predict future project status and progress based on past information and trends. a.Progress reports c.Forecasts b.Status reports d.Updates

c

____ risks are a direct result of implementing a risk response. a. Primary b. Tertiary c. Secondary d. Residual

d

According to the guidelines provided by Practical Communications, Inc., a(n) ____ is the only inappropriate method for expressing support/appreciation. a.phone call c.meeting b.e-mail d.Web site

c

Four people have ____ communications channel(s). a.one c.six b.four d.eight

b

With a(n) ____ contract, the buyer pays the supplier for allowable performance costs along with a predetermined fee and an incentive bonus. a. CPFF b. CPIF c. CPPC d. CPPF

c

With a(n) ____ contract, the buyer pays the supplier for allowable performance costs along with a predetermined percentage based on total costs. a. CPFF b. CPIF c. CPPC d. CPPF

a

With a(n) ____ contract, the buyer pays the supplier for allowable performance costs plus a fixed fee payment usually based on a percentage of estimated costs. a. CPFF b. CPIF c. CPPC d. CPPF

d

____ are/is a qualitative risk analysis tool, and in addition to identifying risks, it maintains an awareness of risks throughout the life of a project. a.Risk factor analysis b.Probability/impact matrices or charts c.Risk registering d.Top Ten Risk Item Tracking

b

____ change orders are oral or written acts or omissions by someone with actual or apparent authority that can be construed to have the same effect as a written change order. a. Direct b. Constructive c. Destructive d. Instructive

b

____ contracts involve a fixed total price for a well-defined product or service. a. CPFF b. Lump sum c. Cost-reimbursable d. Time and material

a

____ describe what the project team has accomplished during a certain period. a.Progress reports c.Forecasts b.Status reports d.Updates

d

____ involves determining what to procure, when, and how. a. Planning contracting b. Administrating procurements c. Conducting procurements d. Planning procurements

d

____ issues cause the most conflicts over the project life cycle. a.Project priority c.Cost b.Staffing d.Schedule

d

"If the information technology project is to produce a new product or service, will it be useful to the organization or marketable to others?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.Market risk

d

"Is there a project champion?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.People risk

d

"Most organizations are not in business to provide information technology services, yet many have spent valuable time and resources on information technology functions when they should have focused on core competencies such as marketing, customer service, and new product design." refers to the ____ benefit of outsourcing. a. Reduce both fixed and recurrent costs b. Provide flexibility c. Access skills and technologies d. Allow the client organization to focus on its core business

a

"Will the project meet NPV, ROI, and payback estimates?" applies to which risk category? a.Financial risk b.Technology risk c.Structure/process risk d.Market risk

b

A(n) ____ is a document used to solicit proposals from prospective suppliers. a. RFQ b. RFP c. COW d. SOW

a

A(n) ____ is a document used to solicit quotes or bids from prospective suppliers. a. RFQ b. RFP c. COW d. SOW

b

A(n) ____ represents decision problems by displaying essential elements, including decisions, uncertainties, causality, and objectives, and how they influence each other. a.risk breakdown structure b.influence diagram c.process flow chart d.system flow chart

d

According to the Standish Group's success potential scoring sheet, ____ has the highest relative importance. a.executive management support b.clear statement of requirements c.proper planning d.user involvement

a

According to the guideline governing ____, designate someone to take minutes and send the minutes out soon after the meeting. a.running the meeting professionally b.providing an agenda to participants before the meeting c.determining who should attend the meeting d.building relationships

b

An October 2005 Information Technology Association of America (ITAA)-sponsored report stated that total savings from offshore resources during the 2005-2010 period are estimated to grow from $8.7 billion to ____. a. $10.2 billion b. $20.4 billion c. $50.4 billion d. $107.9 billion

b

Buyers typically develop a short list of the top ____ suppliers to reduce the work involved in selecting a source. a. one to two b. three to five c. eight to ten d. twelve to fifteen

a

For many projects, properly ____ some information technology functions can be a great investment. a. outsourcing b. scaling c. increasing d. planning

a

In a risk breakdown structure, competitors, suppliers, and cash flow are categories that fall under ____ risk. a.business b.technical c.organizational d.project management

c

It takes ____ to help improve communication. a.timing c.leadership b.highly skilled employees d.outside consultants

d

Many organizations use ____ and templates to generate SOWs. a. details b. outlines c. plans d. samples

d

Often, many non-technical professionals—from colleagues to managers—prefer to ____ about project information to try to find pertinent information. a.read detailed reports c.read Web pages b.read e-mails d.have a two-way conversation

b

Outputs to the ____ process include selected sellers, procurement contract awards, resource calendars, change requests, and updates to the project management plan and other project documents. a. Closing the contract b. Conducting procurements c. Requesting seller responses d. Administering the contract

d

Poor conflict management, poor project organization and definition of responsibilities, and absence of leadership are risk conditions associated with the ____ project management knowledge area. a.Integration b.Quality c.Time d.Human Resources

a

Project sponsors can usually rank scope, time, and cost goals in order of importance in a(n) ____. a.expectations management matrix c.issue log b.responsibility assignment matrix d.priority matrix

c

Research indicates that project managers favor using ____ for conflict resolution over the other four modes. a.compromise c.confrontation b.smoothing d.forcing

c

Since information technology projects often require a lot of coordination, it is a good idea to have ____ meetings. a.long, frequent c.short, frequent b.short, infrequent d.long, infrequent

d

Some items discussed in a(n) ____ include reflections on whether project goals were met, whether the project was successful or not, the causes of variances on the project, the reasoning behind corrective actions chosen, the use of different project management tools and techniques, and personal words of wisdom based on team members' experiences. a.final project report c.audit report b.design document d.lessons-learned report

d

The ____ is a description of the work required for the procurement. a. RFQ b. RFP c. COW d. SOW

c

The ____ line for any e-mail messages you write should clearly state the intention of the e-mail. a.to c.subject b.from d.cc

a

The ____ mode is also called the problem-solving mode. a.confrontation c.smoothing b.compromise d.forcing

b

There are ____ main processes of project procurement management a. three b. four c. five d. six

d

There are ____ major processes involved in risk management. a.three b.four c.five d.six

a

Those who are ____ have a higher tolerance for risk, and their satisfaction increases when more payoff is at stake. a.risk-seeking b.risk-averse c.risk-neutral d.risk-indifferent

b

Two people have ____ communications channel(s). a.zero c.two b.one d.three

d

When using the ____, project managers exert their viewpoint at the potential expense of another viewpoint. a.confrontation mode c.smoothing mode b.compromise mode d.forcing mode

b

When using the ____, project managers retreat or withdraw from an actual or potential disagreement. a.confrontation mode c.smoothing mode b.withdrawal mode d.forcing mode

c

When using the ____, the project manager deemphasizes or avoids areas of differences and emphasizes areas of agreement. a.confrontation mode c.smoothing mode b.withdrawal mode d.forcing mode

c

William Ibbs and Young H. Kwak's study revealed that the ____ industry had the lowest level of project management maturity in the area of quality management. a.engineering/construction b.telecommunications c.information systems d.high-tech manufacturing

c

William Ibbs and Young H. Kwak's study revealed that the ____ industry had the lowest level of project management maturity in the area of risk management. a.engineering/construction b.telecommunications c.information systems d.high-tech manufacturing

b

With the ____, project managers use a give-and-take approach to resolving conflicts. a.confrontation mode c.smoothing mode b.compromise mode d.forcing mode

c

____ analysis simulates a model's outcome many times to provide a statistical distribution of the calculated results. a.Decision tree b.EMV c.Monte Carlo d.Watch list

b

____ applies to positive risks when the project team cannot or chooses not to take any actions toward a risk. a. risk enhancement b. risk acceptance c. risk sharing d. risk exploitation

a

____ are a complete set of organized project records that provide an accurate history of the project. a.Project archives c.Project databases b.Project backups d.Project notes

d

____ are a good way to highlight information provided in important project documents, empower people to be accountable for their work, and have face-to-face discussions about important project issues. a.Information retreats c.Information review meetings b.Status planning meetings d.Status review meetings

a

____ are developed for risks that have a high impact on meeting project objectives, and are put into effect if attempts to reduce the risk are not effective. a.Fallback plans b.Contingency reserves c.Contingency plans d.Contingency allowances

b

____ involves deciding how to approach and plan the risk management activities for the project. a.Identifying risks b.Planning risk management c.Performing qualitative risk analysis d.Performing quantitative risk analysis

a

____ involves determining which risks are likely to affect a project and documenting the characteristics of each. a.Identifying risks b.Planning risk management c.Performing qualitative risk analysis d.Performing quantitative risk analysis

a

____ involves doing whatever you can to make sure the positive risk happens. a.Risk exploitation b.Risk sharing c.Risk enhancement d.Risk acceptance

b

____ involves taking steps to enhance opportunities and reduce threats to meeting project objectives. a.Performing quantitative risk analysis b.Planning risk responses c.Monitoring and controlling risk d.Performing qualitative risk analysis

c

"Organizations can gain access to specific skills and technologies when they are required by using outside resources." refers to the ____ benefit of outsourcing. a. Reduce both fixed and recurrent costs b. Provide flexibility c. Access skills and technologies d. Allow the client organization to focus on its core business

a

"Outsourcing suppliers are often able to use economies of scale that may not be available to the client alone, especially for hardware and software." refers to the ____ benefit of outsourcing. a. Reduce both fixed and recurrent costs b. Allow the client organization to focus on its core business c. Access skills and technologies d. Provide flexibility

a. Determine the probability distribution of each variable. b. For each variable

such as the time estimate for a task, select a random value based on the probability distribution for the occurrence of the variable. c. Assess the range for the variables being considered. d. Run a deterministic analysis or one pass through the model using the combination of values selected for each one of the variables.

a

A(n) ____ is a diagramming analysis technique used to help select the best course of action in situations in which future outcomes are uncertain. a.decision tree b.EMV c.Monte Carlo analysis d.watch list

b

"Outsourcing to provide extra staff during periods of peak workloads can be much more economical than trying to staff entire projects with internal resources." refers to the ____ benefit. a. Reduce both fixed and recurrent costs b. Provide flexibility c. Access skills and technologies d. Allow the client organization to focus on its core business

d

A ____ person achieves a balance between risk and payoff. a.risk-seeking b.risk-averse c.risk-fearing d.risk-neutral

c

A project manager can chart the probability and impact of risks on a ____. a.risk ranking chart b.risk probability table c.probability/impact matrix d.risk assessment matrix

b

Utility rises at a decreasing rate for a ____ person. a.risk-seeking b.risk-averse c.risk-neutral d.risk-indifferent


Related study sets

Business Entities- Final (Stetson Law; Prof. Torres-Spelliscy)

View Set

Micro 9: Viral Vectors & Gene Therapy

View Set

RHIT Domain 3 - Practice questions AHIMA

View Set

BIOL 102 Chapter 22: Darwin and Evolution

View Set

Anatomy & Physiology Lab - Muscles of Hindlimb, Head, Neck and Truck

View Set

CSCI C330 Chapter 3, 4, 5 Possible Question Bank

View Set