更多"[单选题]The project life-cycle can be "的相关试题:
[单选题]Before a project schedule can be created,the schedule maker should have a ( ) ,an effort estimate for each task,and a resource list with availability for each resource.
A.work breakdown structure
B.baseline
C.software requirements specification
D.plan
[单选题]Big data can be described by four charaeteristics: Volume, Variety,locity and Veracity. ( ) refers to the quantity of generated and stored data
A.Volume
B.Variety
C.Velocity
D.Veracity
[单选题]Big data can be described by four characteristics:Volume,Variety,Velocity and Veracity.( )refers to the quantity of generated and stored date.
A.Volume
B.Variety
C.Velocity
D.Veracity
[单选题]The Sahara can be described as______
A.a place of contrasts
B.a place where no one lives
C.an area where the winters are cold
D.an area that appeals to many tourists
[单选题]In a project plan,when the project manager scheouies activities,he(or sha)often uses( )method,precedence relationships between acticities are represented by cireles connected by one or more arrows.The length of the arrow represents the duration of the relevant activity.
A.causality diagram
B.Gantt?chart
C.histogram
D.arrow djgram
[单选题]Software Engineering is best described as ( ).
A.the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts
B.the practice of designing, building, and maintaining ad-hoc software without the use of formal methods
C.the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques
D.the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications
[单选题]Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.
The ransomware attack has been considered a victory because it____
A.cancels a number of computer files
B.successfully blackmails many users
C.affects numerous users worldwide
D.causes panic and chaos at local
[单选题]She( )it very well when she described her younger brother as “brilliant but lazy”.
A.put
B.made
C.assumeD
D.interpreteD
[单选题]Jack described his father,who_______a brave boy many years ago,as a strong-willed man.
A.would be
B.would have been
C.must be
D.must have been
[单选题]Jack described his father,who__________a brave boy many years ago,as astrong-willed man.
A.would be
B.would have been
C.must be
D.must have been
[单选题]Project work packages are typically
decomposed into smaller components called activities to provide a basis for ( ) , scheduling, executing, and
monitoring and controlling the project work.
A.reviewing
B.estimating
C.auditing
D.expecting
[单选题]Schedule compression shortens the project schedule without changing the project scope,to meet schedule constraints,imposed dates,or other schedule objectives.Schedule compression techniques include crashing and( ).
A.fast tracking
A.what-if scenario analysis
B.resource leveling
C.critical chain metho
D.
[单选题]Establishing a project management timetable involves listing milestones,activities,and( )with intended start and finish dates,of which the scheduling of employees may be an element.
A.relationships
B.resources
C.stakeholders
D.deliverables
[单选题]Project selection methods involve measuring value or attractiveness to the project owner or sponsor and may include other organizational decision criteria. ( ) is not a project selection method.
A.Benefit contribution
B.Expert judgment
C.Scoring models
D.Flowcharting
[单选题]Project Integration Management includes the processes and activities to identify, define, combine, unify, and coordinate the various processes and project management activities within the Project Management Process Groups. ( ) process does not belong to Project Integration Management.
A.Developing project charter
B.Developing project management plan
C.Analyzing project risks
D.Monitoring and controlling project