Exam 3 Jeopardy Flashcards

1
Q

The ___________ is developed by the PM at Milestone ___, and updated prior to each Milestone. It reflects the approved program being executed.

A

Acquisition Program Baseline (APB) / Milestone B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAUC

A

Program Acquisition Unit Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A critical breach to the APB is ___% of the current baseline estimate and ___% of the original baseline estimate

A

+25% / +50%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a program deviation occurs, the PM must notify the MDA __________ and follow up within ________- to explain the reason for deviation and to provide a get well plan

A

Immediately / 30 Days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The PM has the flexibility to work within the __________ between threshold and objective parameters.

A

Trade Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The responsibility assignment matrix (RAM) shows the intersection of __________.

A

The WBS (what work needs to be done) and the OBS (who does the work)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The three-step process to develop a Performance Measurement Baseline (PMB).

A

Define the work (WBS)
Schedule the work
Allocate Budgets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A formal review conducted jointly between the Government and contractor, mandatory for all EVMS contracts, assesses validity of control account budgets , resources and time phasing

A

Integrated Baseline Review (IBR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The two major types of EVMS surveillance performed by DCMA

A

System Surveillance &

Program/Contact Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The __________ EVMS guidelines in ANSI/EIA-748 provide a framework to evaluate the adequacy of a contractors EVM system.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of software is an Army intelligence system that is a tactically deployable system that received and correlated data from strategic and tactical intelligence sensors and sources.

A

C4ISR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The common software development approaches

A

Waterfall
Incremental
Agile
Spiral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ provide an organization with a set of processes that, if done by qualified persons using appropriate tools and methods, will provide a capability to do effective and efficient engineering of systems, including their software components.

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Three INFOSEC technologies

A

Firewalls
Encryption
Anti-virus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There are ____ Integrated Product Support (IPS) Elements

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two types of maintenance

A

Scheduled; or Preventative

Unscheduled; or Repair (corrective maintenance)

17
Q

__________ supports the acquisition process by ensuring that logistics considerations are property planned, integrated with the system design so that the system is supportable, continue after fielding to support the system during operations, and dispose of the system safely at the end of its useful life.

A

Life Cycle Logistics

18
Q

There are __ mandatory system safety steps, each of which is essential to achieve acceptable risk through a systematic engineering approach.

A

Eight (8)

19
Q

Executive Order for Greening the Government

A

EO 13101

20
Q

________ minimize the probability of inadvertent initiation and the severity of subsequent collateral damage.

A

Insensitive Munitions

21
Q

Three ways to analyze and document potential hazards.

A
Categorical Exclusion (CATEX)
Environmental Assessment (EA)
Environmental Impact Statement (EIS)
22
Q

______ requires the Program Manager to prepare a Programmatic Environmental, Safety and Occupational Health Evaluation (PESHE) describing the program’s process for integrating ESOH into System Engineering.

A

DoDI 5000.02

23
Q

What is the measure of maintainability?

A

Mean Time To Repair (MTTR)

24
Q

________ incorporates non-proprietary interfaces, protocols, industrial standards, interoperable, and portability.

A

Open Systems Architecture

25
Q

_________ not only concerns the system itself but the entire infrastructure needed to sustain it.

A

Supportability

26
Q

The two goals for RMS?

A

Higher operational effectiveness

Lower ownership costs

27
Q

A ___________ is a term that includes personnel, supplies/equipment, and real property necessary to deploy and sustain a weapon system.

A

Logistical Footprint

28
Q

The three major areas of Life Cycle Logistics are:

A

Acquisition Logistics
Sustainment Logistics
Performance Based Life Cycle Product Support (PBL)

29
Q

The ______ is the current act covering the acquisition of information technology.

A

Clinger-Cohen Act (CCA)

30
Q

____: The first attainment of the minimum capability to effectively employ a weapon item of equipment, or system of approved specific characteristics, and which is manned or operated by an adequately trained, equipped, and supported military unit or force.

A

IOC