Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
A(n) _____ is a document that guides project communications.Answer
This answer is hidden. It contains 28 characters.
Related questions
Q:
Indirect costs are those costs can be traced back to a project in a cost-effective way.
a. True
b. False
Q:
What are some of the advantages that outsourcing offers which is encouraging many companies to adopt it?
Q:
A(n) _____ type of e-procurement that sends requests for information and prices to suppliers and receives the response of suppliers using Internet technology.
Q:
The process of source selection involves evaluating proposals from sellers, choosing the best one, negotiating, and awarding the _____.
Q:
Explain the basic steps involved in performing a Monte Carlo analysis.
Q:
A(n) _____ is a list of risks that are low priority, but are still identified as potential risks.
Q:
The term _____ is used to describe risks that the project team has identified and analyzed.
Q:
_____ is the amount of satisfaction or pleasure received from a potential payoff.
Q:
A project _____ is an uncertainty that can have a negative or positive effect on meeting project objectives.
Q:
_____ are unplanned responses to risk events used when project teams do not have contingency plans in place.a. Workarounds b. Fallback plansc. Contingency plans d. Triggers
Q:
_____ applies to positive risks when the project team cannot or chooses not to take any actions toward a risk.a. Risk enhancement b. Risk acceptancec. Risk sharing d. Risk exploitation
Q:
_____ involves allocating ownership of the risk to another party.a. Risk exploitation b. Risk sharingc. Risk enhancement d. Risk acceptance
Q:
_____ involves shifting the consequence of a risk and responsibility for its management to a third party.a. Risk avoidance b. Risk acceptancec. Risk transference d. Risk mitigation
Q:
_____ involves doing whatever you can to make sure the positive risk happens.a. Risk exploitation b. Risk sharingc. Risk enhancement d. Risk acceptance
Q:
_____ involves reducing the impact of a risk event by reducing the probability of its occurrence.a. Risk avoidance b. Risk acceptancec. Risk transference d. Risk mitigation
Q:
Performing qualitative and quantitative risk analyses are subprocesses of the _____ process of project risk management.a. planning b. executingc. monitoring and controlling d. closing
Q:
Identifying risks is a subprocess of the _____ process of project risk management.a. planning b. executingc. monitoring and controlling d. closing
Q:
_____ is a fact-finding technique that can be used for collecting information in face-to-face, phone, e-mail, or instant-messaging discussions.a. Brainstorming b. Monte Carlo analysisc. The Delphi technique d. Interviewing
Q:
_____ involves monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies throughout the life of the project.a. Performing quantitative risk analysis b. Planning risk responsesc. Controlling risk d. Performing qualitative risk analysis
Q:
A _____ person achieves a balance between risk and payoff.a. risk-seeking b. risk-aversec. risk-fearing d. risk-neutral
Q:
The risk register can be created with a simple Microsoft Word or Excel file.
a. True
b. False
Q:
Top Ten Risk Item Tracking is a quantitative risk analysis tool.
a. True
b. False
Q:
The psychology literature shows that individuals, working alone, produce fewer ideas than the same individuals produce through brainstorming in small, face-to-face groups.
a. True
b. False
Q:
Risks can have both negative and positive effects on meeting project objectives.
a. True
b. False
Q:
The main goal of controlling communications is to ensure the optimal flow of information throughout the entire _____.
Q:
Many information technology professionals work on _____ projects where they never meet their project sponsors, other team members, or other project stakeholders.
Q:
Many experts agree that the greatest threat to the success of any project, especially information technology projects, is a failure to _____.
Q:
Which of the following is a guideline that project managers should follow when communicating with their teams through e-mail?
a. Always reply to all the people to whom the initial message was sent.
b. If the entire message can fit in the subject line, put it there.
c. Minimize the total number of e-mails by including as many subjects as possible in a single e-mail.
d. Continue replying to e-mail messages without changing the subject line to maintain continuity.
Q:
The _____ line for any e-mail messages you write should clearly state the intention of the e-mail.a. to b. fromc. subject d. cc
Q:
E-mail communication is most suited for:
a. assessing commitment to a project.
b. building consensus among disputing parties.
c. mediating a conflict between multiple parties.
d. communicating routine information.