Test3 Flashcards
What is PAUC
Program Acquisition Unit Cost = $ Total Development + $ Procurement + $ Construction / Total Program Quantity
Two TYPES of Maintenance
- Preventative
- Repair
(3 Levels: Org, Intermediate, Depot)
First attainment of the minimum capability to employ a weapon, item, or system.
IOC
(____) supports the acquisition process by ensuring that logistics considerations are properly planned, integrated, continue after fielding, and disposal of the system at end of useful life
Life Cycle Logistics (LCL)
3 Major Areas of LCL.
- Acquisition Logistics
- Sustainment Logistics
- Performance Based Life Cycle Product Support (PBL)
A (___) is a term that includes personnel, supplies/equipment, and real property (land and facilities) necessary to deploy and sustain a weapon system.
Logistics Footprint
Two goals for RMS (reliability, maintainability, and supportability).
- Higher Operational Effectiveness
2. Lower Ownership Costs
(____) not only concerns the system itself but also the entire infrastructure of activities and resources that sustain overall support, and contribute to overall support cost (fuel, equipment, technical data)
Supportability
(_____) incorporates non-proprietary interfaces, protocols, industrial standards, interoperable components, and portability
Open Systems Architecture (OSA)
The Measure of Maintainability
Mean time to repair (MTTR
_____ requires the PM to provide PESHE (programmatic environment, safety, and occupational health evaluation)
DoD 5000.02
3 ways to analyze and document potential hazards
- Categorical Exclusion (CATEX)
- Environmental Assessment (EA)
- Environmental Impact Statement (EIS)
For a Weapons System, system and software _______ will be among its predominant critical requirements.
safety
for a C4I system, ________ issues will be among its predominant critical requirements.
security
for a Defense Business System, _______ issues will be among its predominant critical requirements.
privacy
The mandatory framework defines multiple “views” of an architecture.
- Operational (OV)
- Systems (SV)
- Standards (StdV)
- All (AV)
the purpose of the ________ ________ _______is to ensure programs protect their technology, components, and information thru the acquisition process during design, development, delivery and sustainment.
Program Protection Plan (PPP)
The 4 components of Downtime
- Logistics Delay
- Administrative Delay
- Corrective Maintenance
- Preventative Maintenance
Directs PMs to eliminate ESOR risks and manage residual ESOH risks?
MIL-STD-882
The ____ is developed by PM at milestone ____, and updated prior to each milestone.
Acquisition Program Baseline / MS B
A critical breach to the APB is greater than ___% of the current baseline estimate and ___% of the original baseline estimate
25% / 50% (Significant Breach are +15% and +30%
When a program deviation occurs, the PM must notify the MDA ____ and follow up within ____ days to explain the reason for the problem and corrective steps taken.
Immediately / 30 days
The PM has the flexibility to work within the____ between threshold and objective parameters.
Tradespace
The Responsibility Assignment Matrix (Ram) shows the intersection of the _____ and _____.
WBS (work to be done) and the OBS (who does the work)
3 steps to develop the performance measurement baseline (PMB).
- Define the Work (WBS)
- Schedule the Work
- Allocate Budgets
____is a formal review conducted jointly between the gov’t and contractor, mandatory for all EVM
Integrated Baseline Review (IBR)
2 Major Types of EVMS surveillance
System Surveillance and Program/Contract Surveillance
How many EVMS guidelines
32
What type of software is used for communications?
C4ISR (CMD, control, comms, computers, intel, surveillance and recon)
Common Software Development Approaches
- Waterfall
- Incremental
- Spiral
- Agile
The ____ is the current act covering the acquisition of information technology.
Clinger-Cohen Act (CCA)
____ Provide an organization with a set of processes that, if done by qualified persons using appropriate tools and methods, will provide a capability to do effective and efficient engineering of systems, including their software components
Standards
Key INFOSEC technologies
- Firewalls
- Encryption
- Antivirus Software
There are ____Integrated Product Support (IPS) Elements
12
_____minimize the probability of inadvertent initiation and the severity of subsequent collateral damage due to accidents or actions by an adversary
Insensitive Munitions
Executive order that directs the “greening of the gov’t” to be environmentally responsible
EO 13101
There are how many mandatory system safety steps
8
________ is any real or potential condition that can cause: Injury, illness or death to personnel; Damage to a system, equipment or property; Damage to the environment; The causal factor consists of one or several mechanisms that create the hazard.
Hazard
A ______ (or undesired event) is an event or series of events resulting in death, injury, occupational illness, damage/loss of equipment or property, or damage to the environment
mishap
3 Reasons for Loss of Vendors for Older Systems
- Obsolescence
- Diminished Manufacturing Source (DMS)
- Material shortages
Performance parameters considered by the user to be the most essential, and expressed in threshold and objective values
KPP
Unit Cost Reporting Requirements ACATs ID/IC
Nunn-McCurdy Breach from 1982
_________ __________ is a “phased approach” to acquiring a major IT system.
Modular Contracting
what type of software is used for weapon systems
Embedded Software
what type of software is used for defense business systems (DBS), such as payroll
AIS
during the _________ top-level design for each configuration item function and interface is evaluated to determine if it is ready for detailed design
preliminary design review (PDR)
_________=BCWP-ACWP
Cost Variance
Contracts of _____ or more require a formal EVM system validation
$50M
There are _____ formats for the integrated program management report (IPMR)
7
Only the _____can approve changes to the APB
MDA
_______is comprised of mission reliability and logistics reliability
Reliability
for EVM accounting system, the PM must be able to account for both labor and _____ costs
material
For a _____ breach, the service secretary notifies congress within 45 days. DoD submits a Selected Action Report (SAR) w/ required unit cost breach information
significant
the 6 major logistics functions are supply, maintenance, transportation, ______, health services, and other services
civil engineering
_______ includes those logistics support activities that start as soon as the warfighter in the field receives the first system
Sustainment Logistics
The ____________ is used by the supplier as part of the life cycle management to control evolution of the software
developmental baseline
- The __________ describes details of all the supplier’s testing activities.
software test plan
Best type of contract for software intensive systems?
CPAF
the systematic evaluation of software products and activities by an agency that is not responsible for developing the product or performing the activity being evaluated
IV&V; independent verification and validation
A method of counting or otherwise quantifying characteristics of a process or product.
Measure
the resources, processes, procedures, design considerations, and methods to ensure that the system, equipment, and support items are properly packaged and preserved, handled, stored, and transported.
PHST
having the right part in the right place at the right time in the right quantity at the most economical cost
supply support
A measure of reliability
Mean Time Between Failure