Deck 7: Managing Project Risk

ملء الشاشة (f)
exit full mode
سؤال
The best time to plan for risk is during the project execution phase when risk can be assessed most accurately.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Learning cycles can be used as a tool for identifying threats and opportunities.
سؤال
Project risk management focuses solely on the downside of risk that results from unexpected problems or threats.
سؤال
Unknown-unknown risks are residual risks that we cannot even imagine happening.
سؤال
It never pays to ignore an element of project risk.
سؤال
Triggers or flags in the form of metrics should be identified to draw attention to a particular risk when it occurs.
سؤال
Effective project risk management requires that each risk have an owner.
سؤال
Since IT projects are developed in an environment that changes so rapidly and so extensively, there is little value in using past projects to guide our risk assessment of new ones.
سؤال
The concept of expected value rests on the notion of a probability-weighted summation of component parts.
سؤال
Failure to follow a formal risk management plan will often cause organizations to be reactive and find themselves in a state of perpetual crisis, a condition known as crisis management.
سؤال
Sensitivity analysis is used to determine the joint effects of multiple risky tasks, while Monte Carlo Simulation is used to measure which individual tasks pose the greatest project risk.
سؤال
The PMBOK definition of project risk suggests that a systematic process is needed to effectively manage the risk of a project.
سؤال
The deployment of a specific risk management strategy is in part a function of risk tolerance levels of the stakeholders.
سؤال
The area under the normal distribution curve that lies within 2 standard deviations of the mean (plus or minus) includes about 68% of all the values.
سؤال
The goal of a sound risk management is to completely avoid all risk.
سؤال
Since risk arises from uncertainty, there can be no such category as known risks.
سؤال
In general, because of the similarities in IT projects, one can manage all projects and risks in the same manner.
سؤال
The fishbone or Ishikawa diagram is a form of cause and effect analysis diagramming.
سؤال
Qualitative risk analysis has as one of its strengths the ability to include subjective analysis based on experience and judgment.
سؤال
Nominal Group Technique is a free form, unstructured process similar to Brainstorming.
سؤال
The Payoff Table would be used with which risk assessment technique ?

A) Qualitative Risk Analysis
B) Quantitative Risk Analysis
C) Cause-and- Effect Diagram
D) Simulations
E) Probability Distributions
سؤال
Gaining consensus from a group of experts would be most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
سؤال
_____ is the core layer in the IT Project Risk Identification Framework.

A) Measurable Organizational Value
B) Project objectives
C) Risk sources
D) Internality / Externality
E) Known / Unknown
سؤال
_____requires determining the true problem, or cause, of the risk.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk evaluation
سؤال
Which of the following distributions has mean which is equal to (a + 4b +c) / 6 where a, b, and c are denote optimistic, most likely, and pessimistic estimates respectively?:

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Triangular Distribution
E) Binomial Distribution
سؤال
_____ is an uncertain event that, if it occurs, has a positive or negative effect on project objectives.

A) Risk management
B) Risk response
C) Project risk
D) Risk plan
E) Risk control
سؤال
_____ involves developing a probability distribution for understanding and responding to identified risks.

A) Plan Risk Management
B) Identify Risks
C) Perform Quantitative Risk Analysis
D) Plan Risk Responses
E) Monitor and Control Risks
سؤال
A _____ is a structured tool that identifies risks that have occurred in the past.

A) learning cycle
B) brainstorming session
C) Nominal Group Technique
D) Delphi Technique
E) checklist
سؤال
_____ are the processes of conducting risk management planning, identification, analysis, response planning, and monitoring and control on a project.

A) Project risk management
B) Project risk response
C) Project risk planning
D) Project risk analysis
E) Project risk control
سؤال
Successful risk management requires _____

A) misunderstanding the benefits of risk management
B) inadequate time for risk identification
C) use of a non-standard approach to assess risk
D) stakeholder responsibility
E) occasional monitoring of risks to ensure compliance
سؤال
_____ focuses on root-cause analysis and determining the cause of risks, as well as the effects of risks on the project.

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
سؤال
_____ use only integer or whole numbers, where fractional values are not allowed or would not make sense.

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Triangular Distribution
E) Binomial Distribution
سؤال
Initial generation of ideas without evaluation would be most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
سؤال
Receiving a much larger than usual gas utility bill because of an early spring cold spell is an example of what type of risk?

A) known risk
B) known-unknown risk
C) unknown-unknown risk
D) known-known
E) none of these
سؤال
A _____ identifies threats and opportunities in the external environment as well as organizational strengths and weaknesses .

A) Learning Cycle
B) SWOT Analysis
C) Nominal Group Technique
D) Delphi Technique
E) Checklist
سؤال
Identifying what you know, what you think you know, and things you need to find out would be activities most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
سؤال
_____ prioritizes risks so that an effective risk strategy can be formulated.

A) Risk mitigation
B) Risk assessment
C) Risk avoidance
D) Risk analysis
E) Risk monitoring and control
سؤال
A structured technique for identifying risks which requires participants to rank and prioritize ideas in round-robin fashion is most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
سؤال
The first step in managing IT project risk is _____.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk evaluation
سؤال
_____ involves deciding which risks can impact the project.

A) Plan Risk Management
B) Identify Risks
C) Perform Quantitative Risk Analysis
D) Plan Risk Responses
E) Monitor and Control Risks
سؤال
Risks may be positive or negative. For a positive risk, a project manager would want to _____.

A) accept the risk
B) share ownership
C) avoid the risk
D) reduce the impact of the risk
E) transfer the risk
سؤال
What is project risk management?
سؤال
Through _____, the project manager will scan the project environment to watch for risks as they may arise.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk strategies
سؤال
Why can identifying IT project risks be difficult?
سؤال
What is SWOT analysis? How can this technique be used to identify IT project risks?
سؤال
What is project risk?
سؤال
What is the Delphi Technique? How can this technique be used to identify IT project risks?
سؤال
In a normal distribution we would expect to find _______ of all values with in + or - 2 standard deviation.

A) 13%
B) 34%
C) 68%
D) 95%
E) 99%
سؤال
Once a risk is made known, _____ will execute the planned risk strategy.

A) risk identification
B) risk assessment
C) risk planning
D) risk response
E) risk strategies
سؤال
_____ determines each identified risk's probability of occurrence and impact on the project.

A) Risk mitigation
B) Risk assessment
C) Risk avoidance
D) Risk analysis
E) Risk monitoring and control
سؤال
_____ lead to lessons learned to determine how the risk was handled.

A) risk identification
B) risk assessment
C) risk planning
D) risk response
E) risk evaluation
سؤال
In a normal distribution we would expect to find _______ of all values with in + or - 1 standard deviation.

A) 13%
B) 34%
C) 68%
D) 95%
E) 99%
سؤال
_____involves determining the likelihood and project impact of a risk.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk evaluation
سؤال
_____determines how to deal with the occurrence of a risk.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk strategies
سؤال
_____ randomly generates specific values for a variable with a specific probability distribution.

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Monte Carlo Simulation
E) Binomial Distribution
سؤال
Which of the following distributions has mean which is equal to (a +b +c) / 3 where a, b, and c are denote optimistic, most likely, and pessimistic estimates respectively?:

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Triangular Distribution
E) Binomial Distribution
سؤال
What is meant by crisis management? And why do many organizations find themselves in this mode?
سؤال
Reserves and contingency plans would be used in which risk strategy ?

A) accept or ignore
B) avoidance
C) mitigation
D) transfer
E) none of these
سؤال
Describe how learning cycles can be used to identify IT project risks.
سؤال
What are the six project risk management processes?
سؤال
What is a risk response plan? What should be included?
سؤال
The text discusses three common mistakes found in managing project risk.Choose two of them and after stating them, discuss the implications of making that mistake.
سؤال
Compare the three types of project risk: known, known-unknown, and unknown-unknown.Give an example of each.
سؤال
Briefly describe the six IT Project Risk Management processes.
سؤال
What are the strengths and weaknesses of using the Delphi Technique for identifying threats and opportunities?
سؤال
The text discusses seven main risk response strategies.Briefly describe them and the implications of choosing one over another.
سؤال
What is risk monitoring and control?
سؤال
What is the purpose of a risk impact table?
سؤال
Define and discuss the seven risk strategies described in this chapter.
سؤال
Describe some of the tools that are typically employed to monitor and control risk.
سؤال
What factors determine the appropriate risk strategy to deploy?
سؤال
What should be required of project stakeholders with regard to managing project risk successfully?
سؤال
What is a Monte Carlo simulation? Describe a situation (other than the one used in this chapter) that could make good use of a Monte Carlo simulation.
سؤال
What is a contingency plan?
سؤال
What is a fishbone (Ishikawa) diagram? How can this tool be used to identify IT project risks?
سؤال
How is a Monte Carlo simulation conducted?
سؤال
What are the potential advantages that qualitative approaches have over quantitative ones when it comes to risk analysis and assessment?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/77
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Managing Project Risk
1
The best time to plan for risk is during the project execution phase when risk can be assessed most accurately.
False
2
Learning cycles can be used as a tool for identifying threats and opportunities.
True
3
Project risk management focuses solely on the downside of risk that results from unexpected problems or threats.
False
4
Unknown-unknown risks are residual risks that we cannot even imagine happening.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
5
It never pays to ignore an element of project risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
6
Triggers or flags in the form of metrics should be identified to draw attention to a particular risk when it occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
7
Effective project risk management requires that each risk have an owner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
8
Since IT projects are developed in an environment that changes so rapidly and so extensively, there is little value in using past projects to guide our risk assessment of new ones.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
9
The concept of expected value rests on the notion of a probability-weighted summation of component parts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
10
Failure to follow a formal risk management plan will often cause organizations to be reactive and find themselves in a state of perpetual crisis, a condition known as crisis management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
11
Sensitivity analysis is used to determine the joint effects of multiple risky tasks, while Monte Carlo Simulation is used to measure which individual tasks pose the greatest project risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
12
The PMBOK definition of project risk suggests that a systematic process is needed to effectively manage the risk of a project.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
13
The deployment of a specific risk management strategy is in part a function of risk tolerance levels of the stakeholders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
14
The area under the normal distribution curve that lies within 2 standard deviations of the mean (plus or minus) includes about 68% of all the values.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
15
The goal of a sound risk management is to completely avoid all risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
16
Since risk arises from uncertainty, there can be no such category as known risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
17
In general, because of the similarities in IT projects, one can manage all projects and risks in the same manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
18
The fishbone or Ishikawa diagram is a form of cause and effect analysis diagramming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
19
Qualitative risk analysis has as one of its strengths the ability to include subjective analysis based on experience and judgment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
20
Nominal Group Technique is a free form, unstructured process similar to Brainstorming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
21
The Payoff Table would be used with which risk assessment technique ?

A) Qualitative Risk Analysis
B) Quantitative Risk Analysis
C) Cause-and- Effect Diagram
D) Simulations
E) Probability Distributions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
22
Gaining consensus from a group of experts would be most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
23
_____ is the core layer in the IT Project Risk Identification Framework.

A) Measurable Organizational Value
B) Project objectives
C) Risk sources
D) Internality / Externality
E) Known / Unknown
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
24
_____requires determining the true problem, or cause, of the risk.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following distributions has mean which is equal to (a + 4b +c) / 6 where a, b, and c are denote optimistic, most likely, and pessimistic estimates respectively?:

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Triangular Distribution
E) Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
26
_____ is an uncertain event that, if it occurs, has a positive or negative effect on project objectives.

A) Risk management
B) Risk response
C) Project risk
D) Risk plan
E) Risk control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
27
_____ involves developing a probability distribution for understanding and responding to identified risks.

A) Plan Risk Management
B) Identify Risks
C) Perform Quantitative Risk Analysis
D) Plan Risk Responses
E) Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
28
A _____ is a structured tool that identifies risks that have occurred in the past.

A) learning cycle
B) brainstorming session
C) Nominal Group Technique
D) Delphi Technique
E) checklist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
29
_____ are the processes of conducting risk management planning, identification, analysis, response planning, and monitoring and control on a project.

A) Project risk management
B) Project risk response
C) Project risk planning
D) Project risk analysis
E) Project risk control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
30
Successful risk management requires _____

A) misunderstanding the benefits of risk management
B) inadequate time for risk identification
C) use of a non-standard approach to assess risk
D) stakeholder responsibility
E) occasional monitoring of risks to ensure compliance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ focuses on root-cause analysis and determining the cause of risks, as well as the effects of risks on the project.

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
32
_____ use only integer or whole numbers, where fractional values are not allowed or would not make sense.

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Triangular Distribution
E) Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
33
Initial generation of ideas without evaluation would be most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
34
Receiving a much larger than usual gas utility bill because of an early spring cold spell is an example of what type of risk?

A) known risk
B) known-unknown risk
C) unknown-unknown risk
D) known-known
E) none of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
35
A _____ identifies threats and opportunities in the external environment as well as organizational strengths and weaknesses .

A) Learning Cycle
B) SWOT Analysis
C) Nominal Group Technique
D) Delphi Technique
E) Checklist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
36
Identifying what you know, what you think you know, and things you need to find out would be activities most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
37
_____ prioritizes risks so that an effective risk strategy can be formulated.

A) Risk mitigation
B) Risk assessment
C) Risk avoidance
D) Risk analysis
E) Risk monitoring and control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
38
A structured technique for identifying risks which requires participants to rank and prioritize ideas in round-robin fashion is most closely associated with:

A) Learning Cycles
B) Brainstorming
C) Nominal Group Technique
D) Delphi Technique
E) Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
39
The first step in managing IT project risk is _____.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
40
_____ involves deciding which risks can impact the project.

A) Plan Risk Management
B) Identify Risks
C) Perform Quantitative Risk Analysis
D) Plan Risk Responses
E) Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
41
Risks may be positive or negative. For a positive risk, a project manager would want to _____.

A) accept the risk
B) share ownership
C) avoid the risk
D) reduce the impact of the risk
E) transfer the risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is project risk management?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
43
Through _____, the project manager will scan the project environment to watch for risks as they may arise.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk strategies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
44
Why can identifying IT project risks be difficult?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is SWOT analysis? How can this technique be used to identify IT project risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is project risk?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is the Delphi Technique? How can this technique be used to identify IT project risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
48
In a normal distribution we would expect to find _______ of all values with in + or - 2 standard deviation.

A) 13%
B) 34%
C) 68%
D) 95%
E) 99%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
49
Once a risk is made known, _____ will execute the planned risk strategy.

A) risk identification
B) risk assessment
C) risk planning
D) risk response
E) risk strategies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
50
_____ determines each identified risk's probability of occurrence and impact on the project.

A) Risk mitigation
B) Risk assessment
C) Risk avoidance
D) Risk analysis
E) Risk monitoring and control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
51
_____ lead to lessons learned to determine how the risk was handled.

A) risk identification
B) risk assessment
C) risk planning
D) risk response
E) risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
52
In a normal distribution we would expect to find _______ of all values with in + or - 1 standard deviation.

A) 13%
B) 34%
C) 68%
D) 95%
E) 99%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
53
_____involves determining the likelihood and project impact of a risk.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
54
_____determines how to deal with the occurrence of a risk.

A) risk identification
B) risk assessment
C) risk planning
D) risk monitoring and control
E) risk strategies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
55
_____ randomly generates specific values for a variable with a specific probability distribution.

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Monte Carlo Simulation
E) Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following distributions has mean which is equal to (a +b +c) / 3 where a, b, and c are denote optimistic, most likely, and pessimistic estimates respectively?:

A) Discrete Distribution
B) Normal Distribution
C) Pert Distribution
D) Triangular Distribution
E) Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is meant by crisis management? And why do many organizations find themselves in this mode?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
58
Reserves and contingency plans would be used in which risk strategy ?

A) accept or ignore
B) avoidance
C) mitigation
D) transfer
E) none of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
59
Describe how learning cycles can be used to identify IT project risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
60
What are the six project risk management processes?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
61
What is a risk response plan? What should be included?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
62
The text discusses three common mistakes found in managing project risk.Choose two of them and after stating them, discuss the implications of making that mistake.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
63
Compare the three types of project risk: known, known-unknown, and unknown-unknown.Give an example of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
64
Briefly describe the six IT Project Risk Management processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
65
What are the strengths and weaknesses of using the Delphi Technique for identifying threats and opportunities?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
66
The text discusses seven main risk response strategies.Briefly describe them and the implications of choosing one over another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
67
What is risk monitoring and control?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
68
What is the purpose of a risk impact table?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
69
Define and discuss the seven risk strategies described in this chapter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
70
Describe some of the tools that are typically employed to monitor and control risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
71
What factors determine the appropriate risk strategy to deploy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
72
What should be required of project stakeholders with regard to managing project risk successfully?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
73
What is a Monte Carlo simulation? Describe a situation (other than the one used in this chapter) that could make good use of a Monte Carlo simulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
74
What is a contingency plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is a fishbone (Ishikawa) diagram? How can this tool be used to identify IT project risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
76
How is a Monte Carlo simulation conducted?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
77
What are the potential advantages that qualitative approaches have over quantitative ones when it comes to risk analysis and assessment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.