Final Exam Flashcards
In information systems development projects, _________ would be (an) example(s) of capital resources.
A. the development platform
B. the technological platform the software resides on
C. both the development platform and the technical platform the software resides on
D. the project manager
E. utility computing
C. both the development platform and the technical platform the software resides on
Project risk is an uncertain event or condition that, if it occurs has a \_\_\_\_\_\_\_\_ effect on a project objective. A. positive B. negative C. devastating D. detrimental E. positive or negative
E. positive or negative
Before initiation, risk most often occurs in the \_\_\_\_\_\_\_\_ stage. A. project selection B. project initiation C. project integration D. project evaluation E. project assessment
A. project selection
Which of the following is NOT among the types of risk specifically associated with IS projects?
A. Ongoing changes in technology
B. Finding and assigning skilled personnel
C. Gaining user acceptance
D. Large effects following small changes in scope
E. Finishing on time and on budget
E. Finishing on time and on budget
Which of the following is NOT a risk management process as identified by the PMBOK guide? A. Plan risk management B. Identify risks C. Plan risk responses D. Mitigate risks E. Monitor risks
D. Mitigate risks
The systematic approach to planning the risk management activities of a given project is called: A. Plan risk management B. Identify risks C. Plan risk responses D. Mitigate risks E. Monitor risks
A. Plan risk management
Risk management \_\_\_\_\_\_\_\_ are used to provide organizational standards for project risk management. A. matrices B. schedules C. templates D. plans
C. templates
The overall plan used to outline risks and the strategies used to manage them is called: A. risk outline. B. risk baseline. C. risk management plan. D. risk response plan. E. risk plan.
C. risk management plan.
The process of identifying risks to a project and documenting them is called: A. identify risks. B. manage risks. C. assess risks. D. document risks. E. evaluate risks.
A. identify risks.
The formal record listing all project risks, explaining the nature of the risk, and management of the risk is called: A. risk record. B. risk list. C. risk register. D. risk file. E. risk management matrix
C. risk register.
Changing industry standards are an example of: A. technical risks. B. quality or performance risks. C. project management risks. D. organizational risks. E. external risks.
B. quality or performance risks.
Poor project planning is an example of: A. technical risks. B. quality or performance risks. C. project management risks. D. organizational risks. E. external risks.
C. project management risks.
Reliance on new, unproven, or unreliable technology is an example of: A. technical risks. B. quality or performance risks. C. project management risks. D. organizational risks. E. external risks.
A. technical risks.
Inconsistent goals are an example of: A. technical risks. B. quality or performance risks. C. project management risks. D. organizational risks. E. external risks.
D. organizational risks.
Legal events are an example of: A. technical risks. B. quality or performance risks. C. project management risks. D. organizational risks. E. external risks.
E. external risks.
The review of organizational information to aid during risk identification is called: A. risk review. B. document analysis. C. risk identification audit. D. project file review. E. reviews of published information.
B. document analysis.
Which of the following NOT among the techniques commonly used during risk identification? A. Brainstorming. B. SWOT analysis. C. Interviews. D. Checklists. E. Stakeholder analysis.
E. Stakeholder analysis.
Data analysis tools commonly used during risk identification include all EXCEPT: A. Root cause analysis. B. Assumption and constraint analysis. C. SWOT analysis. D. Value chain analysis. E. Document analysis.
D. Value chain analysis.
Events that serve as early warnings of risk are called: A. warnings. B. risk advisories. C. triggers. D. actuators. E. prompts.
C. triggers.
________ is the evaluation of the potential impact and likelihood of specific risk occurrence.
A. Perform quantitative risk analysis
B. Perform qualitative risk analysis
C. Probability/impact risk rating matrix
D. Impact/likelihood risk rating matrix
E. Perform assumption and constraint analysis
B. Perform qualitative risk analysis
Risk \_\_\_\_\_\_\_\_ is concerned with the likelihood that a certain risk will occur. A. likelihood B. impact C. probability D. strength E. severity
C. probability
Risk \_\_\_\_\_\_\_\_ is concerned with the consequences of the occurrence of a certain risk. A. likelihood B. impact C. probability D. strength E. severity
B. impact
________ is a technique used to analyze project risk in terms of its probability of occurrence and its impact on project outcomes.
A. Perform quantitative risk analysis
B. Perform qualitative risk analysis
C. Probability/impact risk rating matrix
D. Impact/likelihood risk rating matrix
E. Perform assumption and constraint analysis
C. Probability/impact risk rating matrix
The assessment of the quality of the data used to assess risk is called: A. risk data quality assessment. B. project assumption testing. C. risk assessment data testing. D. risk data precision estimation. E. risk data assessment.
A. risk data quality assessment.
A technique used during qualitative risk analysis to test the assumptions made during risk identification is called: A. risk assumption testing. B. risk quality assessment. C. project quality testing. D. project assumption testing. E. qualitative risk assessment.
D. project assumption testing.
________ is the analysis of the probability of occurrence and the impact of risk on project objectives using numerical techniques.
A. Perform quantitative risk analysis
B. Perform qualitative risk analysis
C. Probability/impact risk rating matrix
D. Impact/likelihood risk rating matrix
E. Perform assumption and constraint analysis
A. Perform quantitative risk analysis
Which of the following is NOT a decision technique used during quantitative risk analysis?
A. Risk quantification in terms of additional scheduling and cost needs
B. Identifying the most salient risk in terms of the project
C. Setting realistic targets in terms of scope, cost, and schedule
D. Assessing the likelihood of realizing a specific project objective
E. Identifying the most problematic project requirements in terms of scope
E. Identifying the most problematic project requirements in terms of scope
Tornado analysis is a form of: A. sensitivity analysis. B. simulation. C. EMV analysis. D. graphical analysis. E. risk analysis.
A. sensitivity analysis.
\_\_\_\_\_\_\_\_ is a technique to examine the potential impact of specific risks to a project. A. Sensitivity analysis B. Decision tree analysis C. Impact analysis D. Risk analysis E. Simulation
A. Sensitivity analysis
\_\_\_\_\_\_\_\_ is a statistical technique that captures the average value of potential projects by analyzing the likelihood of possible project outcomes as well as each outcome’s financial consequences. A. Simulation B. EMV analysis C. Tornado analysis D. Decision tree analysis E. Likelihood/consequence analysis
B. EMV analysis
\_\_\_\_\_\_\_\_ is a diagramming technique used to evaluate courses of action in terms of their potential cost and benefits relative to other courses of action. A. Simulation B. EMV analysis C. Tornado analysis D. Decision tree analysis E. Hierarchical risk analysis
D. Decision tree analysis
\_\_\_\_\_\_\_\_ is a technique used to perform what-if analyses to determine the impact of a given situation on a project objective. A. Simulation B. EMV analysis C. Tornado analysis D. Decision tree analysis E. Game theory
A. Simulation
The most well-known simulation technique is called: A. Monaco analysis. B. Monte Carlo analysis. C. Venetian analysis. D. Bellagio analysis. E. Game theory.
B. Monte Carlo analysis.
The process of developing methods for responding to project risks is called: A. Plan risk mitigation. B. Plan risk management. C. Plan risk responses. D. Plan risk reactions. E. Plan risk monitoring.
C. Plan risk responses.
Project team members responsible for specific risk activity decisions are called: A. risk owners. B. risk managers. C. risk holders. D. risk deciders. E. risk mitigators.
A. risk owners.
\_\_\_\_\_\_\_\_ is a risk response strategy designed to avoid potential project risks. A. Risk mitigation B. Risk transference C. Risk acceptance D. Risk avoidance E. Risk escalation
D. Risk avoidance
\_\_\_\_\_\_\_\_ is a risk response strategy designed to transfer risk to another party, often through the use of contracts. A. Risk mitigation B. Risk transference C. Risk related contractual agreements D. Risk removal E. Risk escalation
B. Risk transference
\_\_\_\_\_\_\_\_ is a risk response strategy in which steps are taken to mitigate risks. A. Risk mitigation B. Risk minimization C. Risk reduction D. Risk avoidance E. Risk escalation
A. Risk mitigation
\_\_\_\_\_\_\_\_ is a risk response strategy in which risks are simply accepted and contingency strategies are planned. A. Risk adoption B. Risk response C. Risk contingency planning. D. Risk acceptance E. Risk escalation
D. Risk acceptance
\_\_\_\_\_\_\_\_ is a risk response strategy that involves assigning the response to a higher organizational level if the threat is beyond the authority of the project manager. A. Risk adoption B. Risk response C. Risk contingency planning. D. Risk acceptance E. Risk escalation
E. Risk escalation
A \_\_\_\_\_\_\_\_ is a documented plan for risk response. A. risk document B. risk register C. risk response plan D. risk response register E. risk management plan
C. risk response plan
All of the following are elements of a risk response plan EXCEPT:
A. the roles and responsibilities of any risk owners.
B. a list of actions to be used to implement the risk response strategies.
C. budget and schedule information in terms of risk response.
D. the roles and responsibilities of project stakeholders.
E. any contingency plans used as part of an active response to accept risks.
D. the roles and responsibilities of project stakeholders.
\_\_\_\_\_\_\_\_ are risks that remain after avoidance, transfer, or mitigation strategies have been applied. A. Remaining risks B. Residual risks C. Enduring risks D. Outstanding risks E. Secondary risks
B. Residual risks
\_\_\_\_\_\_\_\_ are risks resulting from the application of a risk response strategy. A. Resulting risks B. Residual risks C. Resultant risks D. Derived risks E. Secondary risks
E. Secondary risks
\_\_\_\_\_\_\_\_ risks is the process of monitoring identified risks for change and controlling those changes. A. Monitor B. Control C. Assess D. Manage E. Evaluate
A. Monitor
\_\_\_\_\_\_\_\_\_ are designed to evaluate the effectiveness of risk response strategies and risk owners. A. Periodic project risk reviews B. Periodic risk assessments C. Project risk assessments D. Project risk response audits E. Technical risk performance audits
D. Project risk response audits
\_\_\_\_\_\_\_\_ are designed to review existing risk activities and to monitor any changes to the project. A. Periodic project risk reviews B. Periodic risk assessments C. Project risk assessments D. Project risk response audits E. Technical risk performance audits
A. Periodic project risk reviews
\_\_\_\_\_\_\_\_ is a tool used to determine whether important technical milestones are being met. A. Technical performance review B. Technical milestone measurement C. Technical performance measurement D. Technical milestone review E. Technical risk performance audits
C. Technical performance measurement
All of the following are types of examples of organizations from which software or its components can be procured EXCEPT:
A. IT services firms.
B. packaged software providers.
C. hardware companies.
D. Software-as-a-Service providers.
E. enterprise solutions software providers.
C. hardware companies.
________ help companies develop custom information systems for internal use, or they develop, host, and run applications for customers.
A. Packaged software providers
B. Vendors of enterprise-wide solution software
C. Software-as-a-Service providers
D. IT services firms
E. IT departments
D. IT services firms
Off-the-shelf software systems that cannot be modified to meet specific needs are called: A. off-the shelf systems. B. generic systems. C. turnkey systems. D. ready-to-go systems. E. closed-source systems.
C. turnkey systems.