A resource constraint can be exploited using CCPM methodology by:
A) determining the priority among projects for access to the drum.
B) scheduling each project to start based on the drum schedule.
C) designating the critical chain as the chain from the first use of the constraining resource to the end of the project.
D) resolving any conflicts if the creation of the capacity constraint buffers adversely affects the drum schedule.
Correct Answer:
Verified
Q43: What are the five steps behind the
Q91: A project is represented by the activity
Q92: Use the project information in the table
Q93: A system-wide constraint is called a:
A)rope.
B)resource.
C)drum.
D)chain.
Q94: Use the project information in the table
Q96: A project is represented by the activity
Q97: Use the project information in the table
Q98: Which statement about critical chain project management
Q99: A project is represented by the activity
Q100: A project is represented by the activity
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents