Risk management, closure management, intellectual property management

Source: Internet
Author: User
Tags knowledge base

First, risk management     1, risk management including which six processes? (kee)        1) The risk management process is a iterative process         2) Risk management Plan (       3) risk identification        4) qualitative risk analysis        5) Quantitative risk analysis        6) Response plan preparation         7) Risk monitoring      2, what are contingency plans? Please give an example.         1) contingency plan. Refers to predetermined measures that the project team will take when a possible risk event actually occurs. Examples          such as: When the project manager based on the actual progress of a new software product development, it is expected that the software development results sauce can not be integrated in a timely manner in the contract-based information System project , they will initiate contingency plans, such as the adoption of a small number of necessary changes to the existing version of the SOFTWARE PRODUCT.      3, what is emergency reserve? Please give an example.         1) means that, according to the project sponsor, if the scope or quality of the project is changed, this portion of the funds can reduce the cost or schedule risk. For example, if a project deviates from the trajectory due to an employee's lack of experience with the use of some new technologies, the project sponsor can allocate a portion of the funds from the contingency reserve, employ external advisers, provide training and advice to project members on the use of new technologies      What are the differences between  4, risk accidents and risk factors?         1) WindAccident is the direct or external cause of loss, is the loss of the media, that is, the risk only through the occurrence of risk accidents can lead to loss.         2) Risk factors are the indirect cause of the loss      5, what are the characteristics of risk identification?         1) Systematic         2 of full-fledged         3) Dependency of dynamic         4) information         5) Comprehensive      6, risk identification steps?         1) data         2) risk situation estimates         3) identify potential risks based on direct or indirect symptoms      7, risk identification methods, Technology and tools? (Answer all, but first three)         1) Delphi Technology          2)         3) SWOT analysis Method      8, what is Delphi technology?         1) Phil Technology is a way for many experts to agree on a particular topic. Project risk management experts participate anonymouslyThis activity      9, what is the SWOT analysis method? (risk identification)         1) SWOT analysis method is an environmental analysis approach. Full Name: Strength advantage, weakness disadvantage, opportunity machine   encounter, threat Challenge      10, SWOT analysis is divided into which five steps? (kee)          1) lists the strengths and weaknesses of the project, possible opportunities and threats           2)   combines internal strengths with external opportunities to form so strategies, develop strategies that seize opportunities and leverage strengths           3) combine internal strengths with external opportunities to form WO strategies and develop strategies for exploiting opportunities to overcome weaknesses           4) combine internal strengths with external opportunities to form ST strategies, develop strategies to mitigate threats using advantages, fill humanely   arrays           5) Combining internal advantages with external opportunities, forming WT strategy, making up the shortcomings, avoiding the threat of strategic      11, risk identification of the graphic technology included in what content? (kee)          1) causal diagram. Also known as Ishikawa map, used to identify the cause of the risk (also available for quality control)          2) system or process flowchart. Shows how the various elements of the system relate to each other and the causal conduction mechanism          3) influence diagram. Show Causal effects     &nbsp12. What are the methods of qualitative risk analysis?          1)   Risk probability and impact assessment method           2) Probability and impact matrix          3) risk classification           4) Risk Urgency assessment method      13, for high-risk, medium-risk, low-risk, what are the measures taken separately? (kee)          1) high risk, may require the adoption of key measures, and adopt a positive response strategy.          2), you may need to take action and take a response strategy.          3) Low risk, simply put it into the list of risks to be observed or allocate an emergency reserve additional, not to take any other immediate direct   access management measures What are the methods of      14 and quantitative risk analysis? (kee)          1) expected monetary law           2) Calculation Analysis factor          3) Program review Technology           4) What are the definitions and steps of Monte Carlo analysis for      15 and munters Carol analysis?          1)Establish a simple and easy-to-implement probabilistic statistical model for display problems so that the solution is exactly the probability distribution of the model   or some of its numerical characteristics, such as the probability of an event or the expected value of the model           2) Set up a sampling method for random variables in the model, simulate experiments on a computer, extract enough random numbers, and   correlate time statistics           3) The simulation results are analyzed, the estimation of the estimated and variance is given, and the model is improved when necessary to improve the efficiency of estimation   accuracy and simulation calculation       16. What are the coping strategies for negative risk? One example shows.          1) circumvention, for example, extending the JINFU or reducing the range           2) transfer, including not limited to the use of insurance, performance bonds, guarantees and certificates          3) to mitigate , the design-time setup of redundant components in the subsystem is likely to mitigate the impact of legacy component failures.      17, what are the coping strategies for positive risk? One example shows.          1), including allocating more capable resources to projects to shorten completion times or achieve higher   quality than originally anticipated          2) sharing, including establishing a risk-sharing partnership, or forming a team specifically for the purpose of opportunity management, a special purpose project   division or a joint venture          3) Improve, promote or enhance the cause of the opportunity, actively strengthen its trigger conditions, increase the probability of chance occurrence, but also focus on   For the impact of driving factors to provide AH project Opportunity    &What are the strategies for nbsp; 18 and applying both negative and positive risks? What are the 2 kinds of cases? Sample. (kee)          1) is an active acceptance of an emergency reserve to address known or potentially unknown threats or opportunities           2) passively accepts, does not require any action, leaves it to the project team, when the risk occurs as appropriate to deal with      19, Why set up a risk warning system?          1) Because of the innovation of the project, one-time, single-character and its complexity, it determines the inevitability of the project risk;          2) The importance of risk management is determined by the difficulty of compensating for the loss and the passivity of the work after the risk has occurred.          3) Traditional risk management is a kind of "retrospective" management, which belongs to the remedial, and for some major projects, often   not.          4) The significance of risk monitoring is to achieve the effective management of project risks, eliminate or control the occurrence of project risks or avoid   adverse consequences. Therefore, the establishment of an effective breast enhancement early warning system, for the effective monitoring of risk has important role and significance of      20, risk monitoring of specific methods?          1) risk re-assessment           2) risk audit          3) variance and trend analysis           4) Technical Performance measurement          5) reserve Analysis          5) Status Review II, What are the contents of risk management     1 and project closure? (       1) Project acceptance        2) Project summary         3) Project evaluation Audit     2, System integration project acceptance of what steps?        1)        2 system test Run         3) System Document acceptance        4) Project Final acceptance report     What is the meaning of   3 and project summary?        1) Understand the work of the whole project and the performance status of related team or members         2) Understand the problems that arise and make improvements        3) understand and summarize the experiences that are worth learning throughout the project process         4) The summary of the document to discuss, through the deposit into the company's knowledge base, so as to incorporate the enterprise process assets      4, general project summary What should be discussed?        1)   Project Performance         2)   Technical performance        3)   cost performance         4)   Schedule performance        5)   Project Communication         6)   Identification issues and problem solving        7)   comments and suggestions      What are the follow-up work for  5 and software projects?        1) software bug modification        2) software upgrade         3) Follow-up of technical support      6, system integration projects?        1) Information System Daily maintenance work        2) hardware product Updates        3) What are the new requirements for information systems      7 and general project personnel transfer processes?        1)   Project team members of the management plan, that is, the project human resources management plan described in the said personnel transfer conditions have   triggers         2)   Project team members have completed the task, submitted a confirmed deliverable and completed the work handover         3)   Project managers and project team members confirm the work of the memberThe connection is over or has been completed        4)   Project manager issues Project team member transfer confirmation file         5)   Project Manager issues performance appraisal documents for project team members        6)   Project manager notifies all relevant stakeholders        7)   If the project closure of all project members to close the project work, should convene a project Summary commendation Conference, Affirmation project results,  team members performance, At the same time, summarize the lessons learned from the project    What is the scope of intellectual property management     1 and intellectual property?        1) Copyrights, patents, trademarks and their derivative or combination of the rights arising.     2, what is a deductive work?        1) a derivative work based on a new work produced by the re-creation of a work. Deductive works are mainly adapted,  translation, comments, comments and collation.     3, what is a work of duty? What are special job titles?        1 works are works that are created as citizens of an employee in order to complete the work of their organization. The prerequisite for determining the work of a job should be   considered: there is a labor relationship between the author and the unit, and the other is the author's responsibility scope for the creation of the works. In addition to the attribution rights, other rights of copyright shall be enjoyed by the unit.        2) Special Duty works, refers to the works listed in 16th 2nd of the Copyright law, namely, engineering design, product design drawings, computer software and maps and other scientific and technological works   How long is the period of protection for    4, copyrights and neighboring rights?        1)   for individuals, the protection period is lifelong, after 50 yearsDecember 31        2)   for the unit, the protection period is 50, but not 50 years after the bankruptcy         3)   Since the product has not been published, 50 years later will no longer be protected     5, invention Patent, utility model, design patent rights, the duration of the period is how many years? When is it calculated?        1) invention patent for the period of 20, utility model, design patent for the period of 10, are calculated from the date of application,          The filing date here refers to the date     6 and judgment of the Patent Administration Department of the State Council for filing the patent application: Intellectual property has regional and temporal nature.        1) Correct

Risk management, closure management, intellectual property management

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.