Many of the activities performed during the preliminary investigation are still being conducted in(1),but in much greater depth than before. During this phase, the analyst must become fully aware of the (2) and must develop enough knowledge about the (3)and the existing systems to enable an effective solution to be proposed and implemented. Besides the(4)for process and data of current system, the deliverable from this phase also includes the(5)for the proposed system.
空白(3)處填()
A.hardware environment
B.testingenvironment
C.software environment
D.business environment
您可能感興趣的試卷
- 2009年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2009年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2010年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2010年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2011年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
- 2011年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師下半年上午試卷
- 2012年計算機技術(shù)與軟件專業(yè)技術(shù)資格高級信息系統(tǒng)項目管理師上半年上午試卷
你可能感興趣的試題
Many of the activities performed during the preliminary investigation are still being conducted in(1),but in much greater depth than before. During this phase, the analyst must become fully aware of the (2) and must develop enough knowledge about the (3)and the existing systems to enable an effective solution to be proposed and implemented. Besides the(4)for process and data of current system, the deliverable from this phase also includes the(5)for the proposed system.
空白(2)處填()
A.main symptom
B.rootproblem
C.finalblueprint
D.dataspecification
Many of the activities performed during the preliminary investigation are still being conducted in(1),but in much greater depth than before. During this phase, the analyst must become fully aware of the (2) and must develop enough knowledge about the (3)and the existing systems to enable an effective solution to be proposed and implemented. Besides the(4)for process and data of current system, the deliverable from this phase also includes the(5)for the proposed system.
空白(1)處填()
A.analysis phase
B.designphase
C.implementationphase
D.maintenancephase
The (1) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several (2).
空白(2)處填()
A.workflow engines
B.processes
C.workflow threads
D.tasks
The (1) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several (2).
空白(1)處填()
A.waterfallmodel
B.workflowreferencemodel
C.evolutionarymodel
D.spiralmodel
Estimating schedule activity costs involves developing an (1) of the cost of theresources needed to complete each schedule activity. Cost estimating includes identifying and considering various costing alternatives. for example, in most application areas, additionalwork during a design phase is widely held to have the potential for reducing the cost of the execution phase and product operations. the cost estimating process considers whether the expected savings can offset the cost of the additional design work. cost estimates are generally expressed in units of (2) to facilitate comparisons both within and across projects.the (3) describes important information about project requirement that is considered during cost estimating.
空白(3)處填()
A.project scope statement
B.statement of work
C.project management plan
D.projectpolicy
最新試題
An example of scope verification is ().
空白(1)處填()
空白(3)處填()
空白(5)處填()
Quality planning tools are often used to help plan effective quality management activities . ()is one of such tools, which involves company actual or planned project practices to those or other projects to generate ideas for improvement and to provide a basis by which to measure performance.
空白(2)處填()
Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes.()is not a project configuration management tool.
Changes may be requested by any stakeholder involved with the project, but changes can be authorized only by()
The connection between two networks from an intemet is handled by a machine known as a()
空白(3)處填()