Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


You are a project manager for Dutch Harbor Consulting. Your latest project involved the upgrade of an organization's operating system on 236 servers. You performed this project under contract. You are in the Contract Closeout process and know that you should document:
A. Lessons learned
B. Performance measurements
C. Formal acceptance
D. Product verification


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Project Management Interview Questions

You have been asked to submit a proposal for a project that has been put out for bid. Prior to submitting the proposal, your company must register so that their firm is on the qualified seller list. Which of the following is true? A. The qualified seller list provides information about the sellers and is a tool and technique of the Solicitation process. B. The qualified seller list provides information about the project and the company that wrote the RFP and is an input to the Solicitation process. C. The qualified seller list provides information about the project and the company that wrote the RFP and is a tool and technique of the Source Selection process. D. The qualified seller list provides information about the sellers and is an input to the Solicitation process.

0 Answers  


All of the following are true regarding the tools and techniques of Activity Sequencing except: A. GERT uses analogous methods. B. GERT allows for loops. C. GERT is a conditional diagramming method. D. GERT allows for conditional branches.

0 Answers  


Your project team is a close group all busily working on project activities. They're close to approaching the performing stage of Team Development. All six members must communicate frequently with each other. How many lines of communication are there? A. 12 B. 15 C. 18 D. 14

0 Answers  


You are a contract project manager working with the State of Bliss. Your latest project involves rewriting the Department of Revenue's income tax system. As project manager, you have taken all the appropriate actions regarding confidentiality of data. One of the key stakeholders is a huge movie huff, and she has the power to promote you into a better position at the conclusion of this project. She's reviewing some report data that just happens to include confidential information regarding one of her favorite movie superstars. What is the most appropriate response? A. Report her to the management team. B. Request that she immediately return the information, citing conflict of interest and violation of confidential company data. C. Do nothing as she has the proper level of access rights to the data and this information showed up unintentionally. D. Request that she immediately return the information until you can confirm that she has the proper level of access rights to the data.

0 Answers  


Your project was just completed. Due to some unfortunate circumstances, the project was delayed causing cost overruns at the end of the project. Which of the following is true? A. You document the circumstances as lessons learned. B. You pay particular attention to archiving the financial records for this project. C. Your project ended due to starvation because of the cost overruns. D. You document the circumstances surrounding the project completion during the Scope Verification process.

0 Answers  


You are constructing a probability/impact risk rating matrix for your project. Which of the following is true? A. The PI matrix multiplies the risk's probability by the cost of the impact to determine an expected value of the risk event. B. The PI matrix multiplies the risk's probability scales, which fall between 0.0 and 1.0, and the risk’s impact scales to determine a risk score. C. The PI matrix multiplies the risk's probability by the expected value of the risk event to determine the risk impact and assign a risk score based on a predetermined threshold. D. The PI matrix multiplies the risk's probability scales and the risk's impact scales, which fall between 0.0 and 1.0, to determine a risk

0 Answers  


Your project sponsor has requested a cost estimate for the project. She would like the cost estimate to be as accurate as possible as this might be her one and only chance to secure the budget for this project due to recent cuts in special projects. You decide: A. To use analogous estimating techniques B. To use bottom-up estimating techniques C. To use top-down estimating techniques D. To use expert judgment techniques

0 Answers  


The lowest level of the WBS is called what? A. Code of accounts B. Requirement C. Milestone D. Work package

0 Answers  


All of the following are true regarding the project plan except: A. Some of its inputs are outputs from other Planning processes. B. It's used to guide the project executing and controlling processes and is the baseline used to measure project performance. C. It consists of one document that should be formally approved and signed by stakeholders. D. It contains things like the WBS, project schedule, and resource assignments.

0 Answers  


Project managers have the highest level of authority and the most power in which type of organizational structure? A. Projectized B. Strong matrix C. Functional D. Balanced matrix

0 Answers  


You are the project manager for Heart of Texas casual clothing company. Your project involves installing a new human resources system. You've identified the risks associated with this project and are ready for the next step. What is the next step? A. You will evaluate the risks and assign probabilities and impacts using Qualitative and/or Quantitative Risk Analysis. B. You will use the Delphi technique to confirm the risks you've detailed and identify others you may have missed. C. You must evaluate the risks and assign probabilities and impacts using both Qualitative Risk Analysis, which comes first, then Quantitative Risk Analysis. D. You will define the steps to take to respond to the risks and detail them in the risk response plan.

0 Answers  


All of the following are tools and techniques of the Integrated Change Control process except: A. Configuration management B. Performance measurements C. Change requests D. Additional planning

0 Answers  


Categories