专业系统集成项目管理工程师网站|培训机构|服务商(2021系统集成项目管理工程师学习QQ群:672729477,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 系统集成项目管理工程师 >> 综合知识 >> 文章内容
系统集成项目管理工程师英语真题资料汇总(2009年—2019年)
来源:信管网 2020年06月24日 【所有评论 分享到微信

系统集成项目管理工程师英语真题资料汇总

2009年上半年

69、Which of the following statement related to PMO is not correct?  (  )

A. The specific form, function, and structure of a PMO is dependent upon the needs of the organization that it supports.

B. One of the key features of a PMO is managing shared resources across all projects administered by the PMO.

C. The PMO focuses on the specified project objectives.

D. The PMO optimizes the use of shared organizational resources across all projects.

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/1385.html

70、 The inputs of developing project management plan do not include (  ).

A. project charter

B. stakeholder management strategy

C. project scope statement

D. outputs from planning processes

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/1386.html

71、 A project life cycle is a collection of generally sequential project(1 )whose name and number are determined by the control needs of the organization or organizations involved in the project.The life cycle provides the basic (2 )for managing the project, regardless of the specific work involved.

(1)A. phases          B. processes         C. segments       D. pieces

(2)A.plan            B. fraction           C. main           D. framework

信管网参考答案:A、D

查看解析:http://www.cnitpm.com/st/1387.html

72、 ()is one of the quality planning outputs.

A. Scope base line

B. Cost of quality

C. Product specification

D. Quality checklist

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/1388.html

2009年下半年

69、Risk management allows the project manager and the project team not to(  ).

A.eliminate most risks during the planning phase of the project

B.identify project risks

C.identify impacts of various risks

D.plan suitable responses

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1312.html

70、 The project life-cycle can be described as(  ).

A.project concept, project planning, project execution, and project close-out

B.project planning, work authorization, and project reporting

C.project planning, project control, project definition, WBS development, and project termination

D.project concept, project execution, and project reporting

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1313.html

71、 (  )is a method used in Critical Path Methodology for constructing a project schedule network diagram that uses boxes or rectangles, referred to as nodes, to represent activities and connects them with arrows that show the logical relationships that exist between them.

A.PERT

B.AOA

C.WBS

D.PDM

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/1314.html

72、 Schedule development can require the review and revision of duration estimates and resource estimates to create an approved(  )that can serve as a baseline to track progress.

A.scope statement

B.activity list

C.project charter

D.project schedule

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/1315.html

73、 The Develop Project Management Plan Process includes the actions necessary to define, prepare, integrate, and coordinate all constituent plans into a (  )

A. Project Scope Statement

B. Project Management Plan

C. Forecasts

D. Project Charter

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/1316.html

2010年上半年

70、Project(  )is an uncertain event or condition that, if it occurs, hasa positive or a negative effect on at least one project objective, such as time,cost, scope, or  quality.

A.risk

B.problem

C.result

D.data

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1239.html

72、 Categories of risk response are (  ).

A.Identification, quantification, response development, and response control

B.Marketing, technical, financial, and human

C.Avoidance, retention, control, and deflection

D.Avoidance, mitigation, acceptance, and Transferring

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/1240.html

73、 (  )is the  application  of planned, systematic  quality activities toensure that the project will employ all processes needed to meet requirements.

A. Quality assurance (QA)

B. Quality planning

C. Quality control (QC)

D. Quality costs

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1241.html

74、 (  ) is primarily concerned with  defining and controlling what is and is not  included in  the  project.

A. Project  Time  Management

B. Project  Cost  Management

C. Project  Scope  management

D. Project  Communications Management

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/1242.html

75、 A project manager believes that modifying the scope of the project may provide added value service for the customer. The project manager should(  ).

A.assign  change  tasks to project  members

B.call  a meeting of the  configuration  control  board

C.change  the  scope  baseline

D.postpone the modification until a separate enhancement project is funded after  this project  is completed according to the  original  baseline

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/1243.html

2010下半年

70、 OSI is a theoretical model that shows how any two different systems can communicate with each other.Router, as a networking device, operate at the (    ) layer of the OSI model.

A.transport

B.application

C.network

D.physical

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/1164.html

71、 Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host.Automated configuration methods, such as (    ) , are required to solve the problem.

A.IPsec

B.DHCP

C.PPTP

D.SOAP

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/1165.html

72、 Business intelligence (BI) is the integrated application of data warehouse, data mining and (    ).

A.OLAP

B.OLTP

C.MRPII

D.CMS.

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1166.html

73、 Perform Quality Control is the process of monitoring and recording results of executing the Quality Plan activities to assess performance and recommend necessary changes.(    ) are the techniques and tools in performing quality control.

①Statistical sampling            ②Run chart                ③Control charts

④Critical Path Method            ⑤Pareto chart           ⑥Cause and effect diagrams

A.①②③④

B.②③④⑤

C.①②③⑤⑥

D.①③④⑤⑥

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/1167.html

74、 Plan Quality is the process of identifying quality requirements and standards for the project and product, and documenting how the project will demonstrate compliance.(  )is a method that analyze all the costs incurred over the life of the product by investment in preventing nonconformance to requirements, appraising the product or service for conformance to requirement, and failing to meet requirements.

A.Cost-Benefit analysis

B.Control charts

C.Quality function deployment

D.Cost of quality analysis

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/1168.html

2011年上半年

70、 TCP/IP communication protocol contains four layers. From bottom to top, the four layers are (  ).

A.network interface layer, internet layer, transport layer and application layer

B.internet layer, network interface layer, transport layer and application layer

C.network interface layer, transport layer, network interface layer and application layer

D.application layer, transport layer, internet layer and network interface layer

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1090.html

71、 Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is (  ).

A.IEEE 802.1

B.IEEE 802.2

C.IEEE 802.3

D.IEEE 802.11

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/1091.html

72、 (  )are the four major activities of software configuration management.

①configuration identification ②statement report ③change control

④preparation of requirement document ⑤configuration auditing

A.①②③④

B.①②④⑤

C.①②③⑤

D.②③④⑤

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/1092.html

73、 The earned value technique is a commonly used method of performance measurement. It integrates project scope, cost, and schedule measures to help the project management team assess project performance. If a project ’ s Schedule Performance Index(SPI=EV/PV) value less than 1.0, it means that (  ).

A.the project is ahead of its planned schedule

B.less work was completed than was planned

C.the cost overrun for work completed

D.the cost under-run of performance to date

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/1093.html

74、 SWOT analysis is a kind of risk identification method. If the project team chose the SO strategy, they should (  ).

A.make full use of the advantage and catch the opportunity

B.overcome the weakness and catch the opportunity

C.make full use of the advantage and reduce the threat

D.overcome the weakness and reduce the threat

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1094.html

2011年下半年

71、 The project manager must maintain an effective communication link with the customer’s satisfaction with the progress of the project. The projectmanager maintains this link through(  ).

A.Periodic project reports, periodic visits to the customer, and telephonic exchanges

B.Subordinates, project team members, and the project sponsor

C.One-time reports, weekly reports, and monthely reports

D.The telephone, facsimile, and data transmission

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/1016.html

72、 A project manager is called to an informal meeting with the customer and a problem is raised. This problem has major implications for the project manager’s company, but the customer wants to pursue a solutionat the meeting, The project manager should(  ).

A.Tell the customer that he will not address any problems

B.Tell the customer that the problem is not sufficiently defined to company to a solution

C.Collect as much information on the problem without committing hiscompany to a solution

D.Give the customer a range of solutions that might be acceptable to his company

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/1017.html

73、 The project schedule is more than a document that lays out the activities over time to representthe time dimension of the project, it is a management tool to be used for decision making. As such , the schedule is used bythe roject management team to(  ).

A.Measure, delay, record, distribute , analyze, and direct

B.Plan, schedule, monitor, control, report, and forecast

C.Promote, highlight, monitor, control, forecast, and report

D.Emphasize, visualize, analyze, conceptualize, report and record

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/1018.html

74、 Which of he following Project Scope Management peocesses involves subdividing the major project deliverables into smaller, more manageablecomponents(  ).

A.Scope Planing

B.Scope Verification

C.Scope Change Control

D.Scope Definition

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/1019.html

75、 The work breakdown structure comprises several levels of decompositionof the total project. The lowest level of definition is always the( )

A.Planning element

B.Work package

C.subtask

D.Working ineterface

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/1020.html

2012年上半年

71、 A (    ) is a dedicated storage network that provides access to consolidated,block level storage.It is primarily used to mark storage devices accessible to servers so that the devices appear as locally attached to the operating system.

A.network-attached storage

B.storge area network

C.direct attached storage

D.computer cluster

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/941.html

72、 Information is no good to you if you can't (    ) it.The location dimension of information means having access to access to information no where you are.

A. access

B. make

C. learn

D. bring

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/942.html

73、 Project manager believes that modifying the project scop may provide added value for the customer.The project manager should(    ).

A.change the scope baseline

B.contact the customer to determine if the change adds value

C.call a meeting of the change control board

D.change the project's objectives

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/943.html

74、 (    ) describees,indetail,the project's deliverables and the work required to create those deliverables.

A.Product scope description

B.Project objectives

C.Produce specification

D.The project scope statement

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/944.html

75、 To ensure the project team provide the functionlity the customer expects in a new prece of software, the project manager ask the customer for sing-off on the design crieria.There documents are(   ).

A.technical speifications

B.performance specifications

C.product descriptions

D.quality assurance

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/945.html

2012年下半年

69、 A test case normally consists of a unique identifier, requirement references from a design specification, events, a series of steps to follow, input, output, actual result, and ( )。

A. bug

B. expected result

C. test report

D. traceability matrix

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/2877.html

70、 The Systems Development Life Cycle (SDLC) is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. Sequential SDLC models, such as( ), focus on complete and correct planning to guide large   projects and risks to successful and predictable results.

A. Waterfall

B. Extreme Programming

C. Spiral

D.  Rapid Frototyping

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/2878.html

71、 Managing risk and documenting them is very important in project planning process. You are in the process of defining key risks, including constraints and assumptions, and planned responses and contingencies. These details will be included in the( )

A. project management plan

B. project baseline

C. risk response plan

D. risk baseline

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/2879.html

72、 The project budget has been finalized.Additional work has been discovered that was not planned for in the budget or project scope. ( )could provide the fund to cover the  newly discovered work item.

A. Contingency reserve

B. Project profit

C. Management reserve

D. Special fund

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/2880.html

73、 Several risk response strategies are available. ( ) the risk simply gives another party responsibility for its management,it does not eliminate risk.

A. Avoiding

B. Mitigating

C. Accepting

D. Transferring

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/2881.html

2013年上半年

71、 ( ) is the use of computing resources (hardware and software) that a delivered as a service over a network (typically the Internet).

A、Virtualization

B、Internet of things

C、Cloud computer

D、Cloud computing

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/4366.html

72、 The work that needs to be accomplished to deliver a product, service ,or result with the specified features and functions is called ( ).

A、Scope management

B、Integrated management

C、SOW

D、PMO

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/4367.html

73、 All of followings should be done by the project manager during project control except ( ).

A、Determine that a change has occurred

B、Ensure that a change is agreed

C、Make sure all changes are approved by management

D、Manage changes as they occur

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/4368.html

74、 Which of following is an important input to scope verification? ( )

A、Work results

B、Historical information

C、Formal acceptance

D、Change request

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/4369.html

75、 Modern computers based on ( ) are millions to billions of times more capable than the early computers, which occupy a fraction of the space. Simple computers are small enough to fit into mobile devices, an mobile computers can be powered by small batteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as ‘computers’.

A、Central Processing Unit

B、integrated circuits

C、Hard disk

D、software integration

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/6528.html

2013年下半年

71、 ( ) is the use of computing resources (hardware and software) that a delivered as a service over a network (typically the Internet).

A、Virtualization

B、Internet of things

C、Cloud computer

D、Cloud computing

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/4366.html

72、 The work that needs to be accomplished to deliver a product, service ,or result with the specified features and functions is called ( ).

A、Scope management

B、Integrated management

C、SOW

D、PMO

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/4367.html

73、 All of followings should be done by the project manager during project control except ( ).

A、Determine that a change has occurred

B、Ensure that a change is agreed

C、Make sure all changes are approved by management

D、Manage changes as they occur

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/4368.html

74、 Which of following is an important input to scope verification? ( )

A、Work results

B、Historical information

C、Formal acceptance

D、Change request

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/4369.html

75、 Modern computers based on ( ) are millions to billions of times more capable than the early computers, which occupy a fraction of the space. Simple computers are small enough to fit into mobile devices, an mobile computers can be powered by small batteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as ‘computers’.

A、Central Processing Unit

B、integrated circuits

C、Hard disk

D、software integration

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/6528.html

2014年上半年

67、 Information theory is related to the quantification of information. This was developed by Claude E. Shannon to who found fundamental limits on ( ) operations such as compressing data and on reliably storing and communicating data.

A. signal

B. data

C. information

D. signal processing

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/12632.html

68、 Circuit-switching technology is used in Publish Switched Telephone Network(PSTN), Global System for Mobile Communications(GSM) and code Division Multiple Access (CMDA) . It is a ( ) information transfer mode.

A. connection oriented

B. connectionless

C. high bandwidth utilization

D.poor real-time

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/12633.html

69、 In project management , a ( 1) is a listing of a project’s milestones, activities, and deliverables, usually with intended start and finish dates. Those items are often estimated in terms of resource (2 ) ,budget and duration, linked by dependencies and scheduled events.

(1)A. schedule

B. activity

C. plan

D. contractor

(2)A. finding

B. balance

C. allocation

D. distribution

信管网参考答案:A、C

查看解析:http://www.cnitpm.com/st/12634.html

70、 A milestone is a significant () in a project.

A. activity

B. event

C. phase

D.process

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/12635.html

2014年下半年

70、 Software engineering is the study and application of engineering to the (), development and maintenance of software.

A.research

B.management

C.assembly

D.design

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/14085.html

71、 ATM (Asynchronous Transfer Mode) technology combines connection oriented mechanism  and () mechanism.

A.circuit switching

B.packet switching

C.message switching

D.voice switching

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/14086.html

72、 A schedule is  commonly used in project planning and project portfolio management. () on a schedule may be closely related to the work breakdown structure (WBS)terminal  elements, the  statement of  work, or a  contract  data requirements list.

A.Essences

B.Elements

C.Purposes

D.Issues

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/14087.html

73、 () management  includes  negotiating  the  terms and conditions in contracts and ensuring compliance with. the terms and conditions, as well as documenting and agreeing on any changes or amendments  that may arise during its implementation or execution.

A.Contract

B.Document

C.Communication

D.Risk

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/14088.html

74、 The Perform Integrated Change  Control  process is conducted from project inception through completion and is the ultimate responsibility of the ().

A.Chang control board

B.Project management office

C.Project manager

D.Configuration management officer

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/14089.html

2015年上半年

68、The ( ) refers to the integration of complex physical machinery with networked sensors and software. It draws together fields such as machine learning, big data, the Internet of things and machine-to-machine communication to ingest data form machines, analyze it (often in real-time), and use it to adjust operations.

A. Industrial internet

B. factory internet

C. Industrial web

D. business internet

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/19400.html

69、Software engineers apply the principles of software engineering to the design, development, ( ),testing, and evaluation of the software and systems that make computers or anything containing software work.

A. Requirement

B. construction

C. service

D. maintenance

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/19401.html

70、The work breakdown structure (WBS) has been widely used in management for software development project, ( ) is generally NOT validated through the WBS

A. Schedule and cost

B. Organization structuring

C. Management coordination

D. Quality of work

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/19402.html

71、( )is the output of the quality planning

A. Scope baseline

B. Cost of quality

C. Scope checklist

D. Quality checklist

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/19403.html

72、The features and functions that characterize a product, service, or esult in a project are called ( ).

A . statement of work

B. Product Scope

C. Product quality

D. Project scope

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/19404.html

2015年下半年

70、Software engineering is the study and an application of engineering to the design, development ,and (  ) of software

A、 maintenance

B、 service

C、 running

D、 deployment

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/2127512371.html

71、Cloud computing is a style of computing in which dynamically scalabled often (  ) resources are provided as a service over the internet

A、 real

B、 rixed

C、 actual

D、 virtualized

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/21276197.html

72、The Project Management Triangle is a model of the constraints of project management. These constraints have been listed scope (or quality), (  ), and cost

A、 resource

B、 time

C、 plan

D、 tool

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/21277240.html

73、Establishing a project (  ) involves listen milestones, activities, and deliverables with intended start and finish dates, of which the scheduling of employees may be an element

A、 cost management plan

B、 risk management plan

C、 soope management plan

D、 management schedule

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/2127826677.html

74、Risk management’s (  ) is to assure uncertainty does not deflect the endeavor from the business goals

A、 trend

B、 detail

C、 objective

D、 rule

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/212792871.html

2016年上半年

66、 WLAN is increasingly popular because it enables cost-effective () among people and applications that were not possible in the past.

A.line

B.circuit

C.connection

D.Interface

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/2325322450.html

67、 ()is not included in the main contents of the operation and maintenance of the  information system.

A.Daily operation and maintenance

B.System change

C.Security management

D.Business change

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/2325420559.html

68、 In project time management, activity definition is the process of identifying and documenting the specific action to be performed to produce the project deliverables. ()are not output of activity definition.

A.Activity list

B.Work Breakdown Structures

C.Activity Attributes

D.Milestone Lists

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/2325527650.html

69、 The customer asks your project to be completed 6 months earlier than planned.You think this target can be reached by-overlapping project activities. This approach is known as ().

A.balance engjneering

B.fast-tracking

C.leveling

D.crashing

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/2325620219.html

70、 The auditing function that provides feedback about the quality of output is referred to as ().

A.quality control

B.quality planning

C.quality assurance

D.quality improvement

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/2325711010.html

2016年下半年

70、 ()is a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand.

A、VPN

B、Big data

C、Cloud computing

D、Cyber-physical System

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/2843916262.html

71、 Unlike more traditional embedded systems, a full-fledged CPS is typically designed as a ()of interacting elements with physical input and output instead of as standalone devices.

A、system

B、mechanism

C、net

D、network

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/2844022649.html

72、 The () plan is aiming to integrate the Internet with traditional industries, and fuel economic growth.

A、Internet Plus action

B、Internet action

C、Web Plus action

D、Net Plus action

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/2844119457.html

74、 In order facilitate configuration and change management, manual or automated tools may be used. Tools selection should be based on the needs of the ().

A、project manage

B、CCB members

C、Project stakeholders

D、Project Management Office(PMO)

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/2844229013.html

75、 Human resource management is the management of human resources. It is function in organization designed to maximize employee () in service of an employer’s strategic objectives.

A、work

B、job

C、scope

D、performance

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/2844310951.html

2017年上半年

69、(  )refers to the application of the internet and other information technology in conventional industries .It is an incomplete equation where various internet(mobile internet,cloud computing,big data or internet of things) can be added to other fileds, fostering new industries and business development.

A、 internet plus

B、industry 4.0

C、big data

D、cloud computing

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/326803195.html

70、For any information system to serve its purpose, the information must be(  )when it is needeD

A、integral

B、available

C、irreplaceable

D、confidential

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/3268220382.html

71、(  )is aproject mangement technique for measuring project performance and process.it has the ability to combine measurements of the projiect management triangle; scope time and costs.

A、Critica path method(CPM)

B、Earned value mangagemengt(EVM)

C、Net present value method(NPVM)

D、Expert judgment method(EJM)

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/3268429974.html

72、The key benefit of(   )is that it provides guidance and direction on how the project costs will be managed throughout the project.

A. Plan Cost Management

B. Control Cost

C. Estimate Cost

D. Determine Budget信管网参考答案:A

查看解析:http://www.cnitpm.com/st/326868077.html

2017年下半年

71、 Retail firms analyze consumer sales trends and user preference through internet user data,This belongs to ()application area.

A、big data

B、cloud computing

C、internet of things

D、artificial intelligence

信管网参考答案:A

查看解析:http://www.cnitpm.com/st/3579325577.html

72、 In the following cloud computing technology architecture,()represented by number 3.

A、PaaS

B、SaaS

C、IaaS

D、cloud platform interface

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/3579426725.html

73、 The seven basic quality tools are used within in the context of the PDCA Cycle to solve quality-related problems.These tools are used in()in the following processes.

A、plan quality management

B、perform quality assurance

C、perform quality control

D、perform quality improvement

信管网参考答案:C

查看解析:http://www.cnitpm.com/st/357954627.html

74、 ()is the process of implementing risk response plans,tracking identified risks,monitoring residual risk,identifying new risk,and evaluating risk process effectiveness throughout the project.

A、Identity risks

B、Control risks

C、Plan risk responses

D、Plan risk management

信管网参考答案:B

查看解析:http://www.cnitpm.com/st/357967884.html

75、 ( )is the approved version of the time-phased project budget,excluding any management reserves,which can only be changed through formal change control precedures and is used as a basis for comparison to actual results.

A、The control accounts

B、Funding requirement

C、The cost estimates

D、The cost baseline

信管网参考答案:D

查看解析:http://www.cnitpm.com/st/3579724033.html

2018年上半年

71、() is a programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster. The model is a specialization of the split-apply-combine strategy for data analysis.

A. HDFS

B. Chukwa

C. MapReduce

D. HBase

信管网参考答案:B

信管网解析:http://www.cnitpm.com/pm1/58535.html

72、The IoT architecture can be divided into three layers.  (     ) is the key layer to realize the foundational capabilities which support the electronic devices interact with physical world.

A. Sensing layer

B. Network layer

C. Application layer

D. Operation

信管网参考答案:C

信管网解析:http://www.cnitpm.com/pm1/58536.html

73、Project Integration Management includes the processes and activities to identify, define, combine, unify, and coordinate the various processes and project management activities within the Project Management Process Groups. (   ) process does not belong to Project Integration Management.

A. Developing project charter

B. Developing project management plan

C. Analyzing project risks

D.Monitoring and controlling project

信管网参考答案:D

信管网解析:http://www.cnitpm.com/pm1/58537.html

74、In project management and systems engineering, (     ) is a deliverable-oriented breakdown of a project into smaller components. It is a key project deliverable that organizes the team's work into manageable sections.

A. RBS

B. PBS

C. GBS

D. WBS

信管网参考答案:B

信管网解析:http://www.cnitpm.com/pm1/58538.html

75、 (     ) is the sum of all budgets established for the work to be performed.

A. CPI

B. BAC

C. SPI

D. EAC

信管网参考答案:B

信管网解析:http://www.cnitpm.com/pm1/58538.html

2018年下半年

71、Cloud storage is a model of computer of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (somentimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. As for the cloud concepet, the cloud storage service is one kind of ().

A、IaaS

B、PaaS

C、SaaS

D、DaaS

信管网参考答案:A

信管网解析:http://www.cnitpm.com/pm1/61137.html

72、( ) is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the abillity to “learn” (i.e., progressively improve performance on a specific task) with data. Without being explicitly programmed.

A、Machine learning

B、Program language learning

C、Natural language learning

D、Statistical learning

信管网参考答案:A

信管网解析:http://www.cnitpm.com/pm1/65381.html

73、Configuration management is focused on the specification of both the deliverables and the processes; while () is focused on identifying, documenting, and approving or rejecting changes to the project documents, deliverables, or baselines.

A、cost management

B、change management

C、configuration management

D、capacity management

信管网参考答案:B

信管网解析:http://www.cnitpm.com/pm1/65382.html

74、Quality management ensures that an organization, product or service is consistent. It has four main components: quality planning,quality assurance () and quality improvement.

A、quality objective

B、quality policy

C、quality control

D、quality system

信管网参考答案:C

信管网解析:http://www.cnitpm.com/pm1/65383.html

75、 In a project plan, when the project manager schedules activities, he (or she) often uses ( ) method,precedence relationships between acticities are represented by cireles connected by one or more arrows. The length of the arrow represents the duration of the relevant activity.

A、causality diagram

B、Gantt chart

C、histogram

D、arrow diagram

信管网参考答案:D

信管网解析:http://www.cnitpm.com/pm1/65384.html

2019年上半年

70、big data can be described by four characteristics: volume,variety, locity and veracity.()refers to the quantity of generated and stored date.

a、volume

b、variety

c、velocity

d、veracity

信管网参考答案:a

查看解析:www.cnitpm.com/st/4107630.html

71、is the extension of internet connectivity into physical devices and everyday objects.embedded with electronics,internet connectivity and other forms of hardware (such as sensors), these devices can communicate and interact with others over the internet ,and they can be remotely monitored and controlled.

a、cloud computing

b、internet of things

c、block chain

d、artificial intelligence

信管网参考答案:b

查看解析:www.cnitpm.com/st/4107710057.html

72、is a process of developing a document that formally authorizes the existence of a project and provides the project manager with the authority to apply organizational resources to project activities.

a、 develop project charter

b、manage project knowledge

c、monitor and control project work

d、close project

信管网参考答案:a

查看解析:www.cnitpm.com/st/4107824333.html

73、()is a process of developing a detailed description of the project and product

a、collect requirements

b、definition scope

c、validate scope

d、control range

信管网参考答案:b

查看解析:www.cnitpm.com/st/410791250.html

74、()is a process of monitoring the status of the project to update the project costs and manage changes ti the cost baseline.

a、plan cost management

b、estimate costs

c、determine budget

d、control costs

信管网参考答案:d

查看解析:www.cnitpm.com/st/4108014764.html

2019年下半年

71、(  )contributes to monitoring and data collection by defining security monitoring and date collection requirements.

a、information continuity management

b、information catalogue management

c、information security management

d、information distribution management

信管网参考答案:c

查看解析:www.cnitpm.com/st/4138811777.html

72、() seek to perform root cause investigation as to what is leading identified trends.

a、 incident management

b、 prob lem management

c、change management

d、know ledge management

信管网参考答案:a

查看解析:www.cnitpm.com/st/4138916043.html

73、the (  ) is a graph that shows the relationship between two variables.

a、histograms

b、flowcharts

c、matrix diagrams

d、scatter diagrams

信管网参考答案:c

查看解析:www.cnitpm.com/st/4139014581.html

74、(  )is the process of identifying individual project risks as well as source of overall project risk, and documenting their characteristics.

a、identify risks

b、monitor risks

c、impiement risks responses

d、plan risk management

信管网参考答案:a

查看解析:www.cnitpm.com/st/4139119636.html

75、work performance information is circulated through(  ) processes.

a、 planning

b、 change

c、 improvement

d、 communication

信管网参考答案:d

查看解析:www.cnitpm.com/st/4139218051.html


扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章