Deck 8: Managing Project Risk

ملء الشاشة (f)
exit full mode
سؤال
It never pays to ignore an element of project risk.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Qualitative risk analysis has as one of its strengths the ability to include subjective analysis based on experience and judgment.
سؤال
Nominal Group Technique is a free form,unstructured process similar to Brainstorming.
سؤال
The PMBOK definition of project risk suggests that a systematic process is needed to effectively manage the risk of a project.
سؤال
Triggers or flags in the form of metrics should be identified to draw attention to a particular risk when it occurs.
سؤال
In general,because of the similarities in IT projects,one can manage all projects and risks in the same manner.
سؤال
The fishbone or Ishikawa diagram is a form of cause and effect analysis diagramming.
سؤال
The area under the normal distribution curve that lies within 2 standard deviations of the mean plus or minus)includes about 68% of all the values.
سؤال
The concept of expected value rests on the notion of a probability-weighted summation of component parts.
سؤال
Since risk arises from uncertainty,there can be no such category as known risks.
سؤال
Failure to follow a formal risk management plan will often cause organizations to be reactive and find themselves in a state of perpetual crisis,a condition known as crisis management.
سؤال
Learning cycles can be used as a tool for identifying threats and opportunities.
سؤال
Effective project risk management requires that each risk have an owner.
سؤال
Since IT projects are developed in an environment that changes so rapidly and so extensively,there is little value in using past projects to guide our risk assessment of new ones.
سؤال
The goal of a sound risk management is to completely avoid all risk.
سؤال
The deployment of a specific risk management strategy is in part a function of risk tolerance levels of the stakeholders.
سؤال
Unknown-unknown risks are residual risks that we cannot even imagine happening.
سؤال
Project risk management focuses solely on the downside of risk that results from unexpected problems or threats.
سؤال
The best time to plan for risk is during the project execution phase when risk can be assessed most accurately.
سؤال
Sensitivity analysis is used to determine the joint effects of multiple risky tasks,while Monte Carlo Simulation is used to measure which individual tasks pose the greatest project risk.
سؤال
_____ is an interim lessons learned to determine how the risk was handled.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk evaluation
سؤال
The first step in managing IT project risk is _____.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
سؤال
The IT Project Risk Management Processes include all of the following except:

A)Plan Risk Management
B)Identify Risks
C)Risk Elimination
D)Perform Qualitative Risk Analysis
E)Monitor and Control Risks
سؤال
_____requires determining the problem,or cause,of the risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
سؤال
Successful risk management requires _____

A)misunderstanding the benefits of risk management
B)inadequate time for risk identification
C)use of a non-standard approach to assess risk
D)stakeholder responsibility
E)occasional monitoring of risks to ensure compliance
سؤال
Risks may be positive or negative.For a positive risk,a project manager would want to _____.

A)accept the risk
B)share ownership
C)avoid the risk
D)reduce the impact of the risk
E)transfer the risk
سؤال
_____ is an uncertain event that,if it occurs,has a positive or negative effect on project objectives.

A)Risk management
B)Risk response
C)Project risk
D)Risk plan
E)Risk control
سؤال
_____ is the core layer in the IT Project Risk Identification Framework.

A)Measurable Organizational Value
B)Project objectives
C)Risk sources
D)Internality / Externality
E)Known / Unknown
سؤال
_____ involves development of a risk management plan.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
سؤال
Identifying what you know,what you think you know,and things you need to find out would be activities most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
سؤال
_____determines how to deal with the occurrence of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
سؤال
_____involves determining the likelihood and project impact of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
سؤال
Once a risk is made known,_____ will execute the planned risk strategy.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk strategies
سؤال
Through _____,the project manager will scan the project environment to watch for risks as they may arise.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
سؤال
_____ are the processes of conducting risk management planning,identification,analysis,response planning,and monitoring and control on a project.

A)Project risk management
B)Project risk response
C)Project risk planning
D)Project risk analysis
E)Project risk control
سؤال
_____ involves developing procedures and techniques to reduce the threat of risks and enhance the likelihood of opportunities.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
سؤال
_____ involves deciding which risks can impact the project.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
سؤال
Gaining consensus from a group of experts would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
سؤال
_____ provides an early warning system to monitor identified risks and any new risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
سؤال
_____ involves developing a probabilistic model for understanding and responding to identified risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
سؤال
In a normal distribution we would expect to find _______ of all values with in + or - 1 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
سؤال
_____ randomly generates specific values for a variable with a specific probability distribution.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Monte Carlo Simulation
E)Binomial Distribution
سؤال
Which of the following distributions has mean which is equal to a + 4b +c)/ 6 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
سؤال
What are the seven IT project risk management processes?
سؤال
A _____ identifies threats and opportunities in the external environment as well as organizational strengths and weaknesses .

A)Learning Cycle
B)SWOT Analysis
C)Nominal Group Technique
D)Delphi Technique
E)Checklist
سؤال
_____ use only integer or whole numbers,where fractional values are not allowed or would not make sense.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
سؤال
_____ focuses on root-cause analysis and determining the cause of risks,as well as the effects of risks on the project.

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
سؤال
A _____ is a structured tool that identifies risks that have occurred in the past.

A)learning cycle
B)brainstorming session
C)Nominal Group Technique
D)Delphi Technique
E)checklist
سؤال
In which step of the risk planning process does the text say one might decide to transfer project risk to someone else i.e. ,use insurance)?

A)risk planning
B)risk identification
C)risk assessment
D)risk strategies
E)risk monitoring and control
سؤال
_____ determines each identified risk's probability of occurrence and impact on the project.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
سؤال
Which of the following distributions has mean which is equal to a +b +c)/ 3 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
سؤال
A structured technique for identifying risks which requires participants to rank and prioritize ideas in round-robin fashion is most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
سؤال
Receiving a much larger than usual gas utility bill because of an early spring cold spell is an example of what type of risk?

A)known risk
B)known-unknown risk
C)unknown-unknown risk
D)known-known
E)none of the above
سؤال
The Payoff Table would be used with which risk assessment technique ?

A)Qualitative Risk Analysis
B)Quantitative Risk Analysis
C)Cause-and- Effect Diagram
D)Simulations
E)Probability Distributions
سؤال
In a normal distribution we would expect to find _______ of all values with in + or - 2 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
سؤال
Initial generation of ideas without evaluation would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
سؤال
What is project risk?
سؤال
_____ prioritizes risks so that an effective risk strategy can be formulated.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
سؤال
What is project risk management?
سؤال
What is meant by crisis management? And why do many organizations find themselves in this mode?
سؤال
Describe how learning cycles can be used to identify IT project risks.
سؤال
What is a Monte Carlo simulation? Describe a situation other than the one used in this chapter)that could make good use of a Monte Carlo simulation.
سؤال
Define and discuss the four risk strategies described in this chapter.
سؤال
What is a risk response plan? What should be included?
سؤال
Why can identifying IT project risks be difficult?
سؤال
What is the Delphi Technique? How can this technique be used to identify IT project risks?
سؤال
What is the purpose of a risk impact table?
سؤال
What is SWOT analysis? How can this technique be used to identify IT project risks?
سؤال
What is a contingency plan?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Managing Project Risk
1
It never pays to ignore an element of project risk.
False
2
Qualitative risk analysis has as one of its strengths the ability to include subjective analysis based on experience and judgment.
True
3
Nominal Group Technique is a free form,unstructured process similar to Brainstorming.
False
4
The PMBOK definition of project risk suggests that a systematic process is needed to effectively manage the risk of a project.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
5
Triggers or flags in the form of metrics should be identified to draw attention to a particular risk when it occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
6
In general,because of the similarities in IT projects,one can manage all projects and risks in the same manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
7
The fishbone or Ishikawa diagram is a form of cause and effect analysis diagramming.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
8
The area under the normal distribution curve that lies within 2 standard deviations of the mean plus or minus)includes about 68% of all the values.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
9
The concept of expected value rests on the notion of a probability-weighted summation of component parts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
10
Since risk arises from uncertainty,there can be no such category as known risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
11
Failure to follow a formal risk management plan will often cause organizations to be reactive and find themselves in a state of perpetual crisis,a condition known as crisis management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
12
Learning cycles can be used as a tool for identifying threats and opportunities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
13
Effective project risk management requires that each risk have an owner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
14
Since IT projects are developed in an environment that changes so rapidly and so extensively,there is little value in using past projects to guide our risk assessment of new ones.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
15
The goal of a sound risk management is to completely avoid all risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
16
The deployment of a specific risk management strategy is in part a function of risk tolerance levels of the stakeholders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
17
Unknown-unknown risks are residual risks that we cannot even imagine happening.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
18
Project risk management focuses solely on the downside of risk that results from unexpected problems or threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
19
The best time to plan for risk is during the project execution phase when risk can be assessed most accurately.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
20
Sensitivity analysis is used to determine the joint effects of multiple risky tasks,while Monte Carlo Simulation is used to measure which individual tasks pose the greatest project risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
21
_____ is an interim lessons learned to determine how the risk was handled.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
22
The first step in managing IT project risk is _____.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
23
The IT Project Risk Management Processes include all of the following except:

A)Plan Risk Management
B)Identify Risks
C)Risk Elimination
D)Perform Qualitative Risk Analysis
E)Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
24
_____requires determining the problem,or cause,of the risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
25
Successful risk management requires _____

A)misunderstanding the benefits of risk management
B)inadequate time for risk identification
C)use of a non-standard approach to assess risk
D)stakeholder responsibility
E)occasional monitoring of risks to ensure compliance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
26
Risks may be positive or negative.For a positive risk,a project manager would want to _____.

A)accept the risk
B)share ownership
C)avoid the risk
D)reduce the impact of the risk
E)transfer the risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
27
_____ is an uncertain event that,if it occurs,has a positive or negative effect on project objectives.

A)Risk management
B)Risk response
C)Project risk
D)Risk plan
E)Risk control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
28
_____ is the core layer in the IT Project Risk Identification Framework.

A)Measurable Organizational Value
B)Project objectives
C)Risk sources
D)Internality / Externality
E)Known / Unknown
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
29
_____ involves development of a risk management plan.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
30
Identifying what you know,what you think you know,and things you need to find out would be activities most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____determines how to deal with the occurrence of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
32
_____involves determining the likelihood and project impact of a risk.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
33
Once a risk is made known,_____ will execute the planned risk strategy.

A)risk identification
B)risk assessment
C)risk planning
D)risk response
E)risk strategies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
34
Through _____,the project manager will scan the project environment to watch for risks as they may arise.

A)risk identification
B)risk assessment
C)risk planning
D)risk monitoring and control
E)risk strategies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
35
_____ are the processes of conducting risk management planning,identification,analysis,response planning,and monitoring and control on a project.

A)Project risk management
B)Project risk response
C)Project risk planning
D)Project risk analysis
E)Project risk control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
36
_____ involves developing procedures and techniques to reduce the threat of risks and enhance the likelihood of opportunities.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
37
_____ involves deciding which risks can impact the project.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
38
Gaining consensus from a group of experts would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
39
_____ provides an early warning system to monitor identified risks and any new risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Qualitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
40
_____ involves developing a probabilistic model for understanding and responding to identified risks.

A)Plan Risk Management
B)Identify Risks
C)Perform Quantitative Risk Analysis
D)Plan Risk Responses
E)Monitor and Control Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
41
In a normal distribution we would expect to find _______ of all values with in + or - 1 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
42
_____ randomly generates specific values for a variable with a specific probability distribution.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Monte Carlo Simulation
E)Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following distributions has mean which is equal to a + 4b +c)/ 6 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are the seven IT project risk management processes?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
45
A _____ identifies threats and opportunities in the external environment as well as organizational strengths and weaknesses .

A)Learning Cycle
B)SWOT Analysis
C)Nominal Group Technique
D)Delphi Technique
E)Checklist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
46
_____ use only integer or whole numbers,where fractional values are not allowed or would not make sense.

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
47
_____ focuses on root-cause analysis and determining the cause of risks,as well as the effects of risks on the project.

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
48
A _____ is a structured tool that identifies risks that have occurred in the past.

A)learning cycle
B)brainstorming session
C)Nominal Group Technique
D)Delphi Technique
E)checklist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
49
In which step of the risk planning process does the text say one might decide to transfer project risk to someone else i.e. ,use insurance)?

A)risk planning
B)risk identification
C)risk assessment
D)risk strategies
E)risk monitoring and control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
50
_____ determines each identified risk's probability of occurrence and impact on the project.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following distributions has mean which is equal to a +b +c)/ 3 where a,b,and c are denote optimistic,most likely,and pessimistic estimates respectively?:

A)Discrete Distribution
B)Normal Distribution
C)Pert Distribution
D)Triangular Distribution
E)Binomial Distribution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
52
A structured technique for identifying risks which requires participants to rank and prioritize ideas in round-robin fashion is most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
53
Receiving a much larger than usual gas utility bill because of an early spring cold spell is an example of what type of risk?

A)known risk
B)known-unknown risk
C)unknown-unknown risk
D)known-known
E)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Payoff Table would be used with which risk assessment technique ?

A)Qualitative Risk Analysis
B)Quantitative Risk Analysis
C)Cause-and- Effect Diagram
D)Simulations
E)Probability Distributions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
55
In a normal distribution we would expect to find _______ of all values with in + or - 2 standard deviation.

A)13%
B)34%
C)68%
D)95%
E)99%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
56
Initial generation of ideas without evaluation would be most closely associated with:

A)Learning Cycles
B)Brainstorming
C)Nominal Group Technique
D)Delphi Technique
E)Cause-and-Effect Diagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is project risk?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
58
_____ prioritizes risks so that an effective risk strategy can be formulated.

A)Risk mitigation
B)Risk assessment
C)Risk avoidance
D)Risk analysis
E)Risk monitoring and control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
59
What is project risk management?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
60
What is meant by crisis management? And why do many organizations find themselves in this mode?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
61
Describe how learning cycles can be used to identify IT project risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is a Monte Carlo simulation? Describe a situation other than the one used in this chapter)that could make good use of a Monte Carlo simulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
63
Define and discuss the four risk strategies described in this chapter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
64
What is a risk response plan? What should be included?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
65
Why can identifying IT project risks be difficult?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
66
What is the Delphi Technique? How can this technique be used to identify IT project risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
67
What is the purpose of a risk impact table?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
68
What is SWOT analysis? How can this technique be used to identify IT project risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
69
What is a contingency plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 69 في هذه المجموعة.