First, risk management
1. What are the six processes of risk management? Remember
For:
(1) Risk management planning;
(2) risk identification;
(3) Qualitative risk analysis;
(4) Quantitative risk analysis;
(5) Preparation of the response plan;
(6) Risk monitoring.
2. What is contingency plan? Please give an example.
A: Refers to predetermined measures that the project team will take when a possible risk event actually occurs. For example, a small amount of necessary changes to an existing version of the SOFTWARE PRODUCT is taken.
3, what is the emergency reserve? Please give an example.
A: According to the project sponsor, if the scope or quality of the project changes, this part of the funds can reduce the cost or schedule risk. For example, if a project deviates from the trajectory due to an employee's inexperience with the use of some new technologies, the project sponsor can allocate a portion of the funds from the contingency reserve, employ external advisers, and provide training and advice to project members on the use of new technologies.
4. What are the differences between risk and risk factors?
A: In the case of an event, if it is the direct cause of the loss, then it is a risk accident, and under other conditions, if it is the indirect cause of the loss, it is the risk factor.
5. What are the characteristics of risk identification?
A: (1) full-fledged, (2) systematic, (3) dynamic, (4) Information-dependent, (5) comprehensive.
6. What are the steps of risk identification?
A: (1) collect information, (2) Risk situation estimates, (3) identify potential risks based on direct or indirect symptoms.
7. Methods, techniques and tools for risk identification? (Answer all but remember the first three)
A: Delphi, brainstorming, checklist, SWOT techniques, checklists, and graphic techniques.
8. What is Delphi technology?
A: Delphi technology is a way for many experts to agree on a particular topic.
9, what is the SWOT analysis method?
A: SWOT analysis is a method of environmental analysis, the abbreviation of English strength (superiority), weakness (disadvantage), ppportunity (opportunity) and threat (challenge).
9. What are the five steps of SWOT analysis? Remember
For:
(1) List the advantages and disadvantages of the project, possible opportunities and threats, fill in the 1, 2, 3, and 4 zones of the humanely matrix.
(2) Combine internal advantages with external opportunities to form so strategy, develop strategies to seize opportunities and exert advantages, and fill the 5 area of humanely matrix.
(3) Combining internal disadvantage and external opportunity to form WO strategy, develop strategies to seize the opportunity to overcome weaknesses, fill the humanely matrix of the 6 area.
(4) Combining internal advantages with external threats, forming ST strategy, developing strategies to mitigate threats using advantages, and filling the 7 area of the humanely matrix.
(5) Combining internal disadvantage and external challenge, forming WT strategy, making up the strategy of remedying defects and avoiding threat, filling the 8 area of humanely matrix.
10. What are the graphic techniques in risk identification? Remember
Answer: Causality diagram, System or process flowchart, Impact diagram.
11. What are the methods of qualitative risk analysis?
Answer: Risk probability and impact assessment method, probability and impact matrix, risk urgency assessment.
12, for high risk, medium risk, low risk, what measures are taken separately? Remember
For:
(1) For high risk, we should first focus on this, take the key measures, and take a positive response strategy.
(2) To take measures against the risks in the middle, and to adopt the coping strategies.
(3) For low risk, simply place it in the list of risks to be observed or allocate additional emergency reserves, without any other immediate direct management measures, and should be monitored.
13. What are the quantitative risk analysis methods? Remember
A: Expected currency value, calculation analysis factor, plan review technology, Monte Carlo analysis.
14. What is the definition and procedure of munters Carol analysis?
A: Monte Carlo analysis is also called stochastic simulation method. The basic steps are as follows:
(1) To establish a simple and easy-to-implement probabilistic statistical model for practical problems, so that the solution is exactly the probability distribution of the established model or some of its digital characteristics.
(2) Set up a sampling method for random variables in the model, simulate experiments on the computer, extract enough random numbers, and statistic the related events.
(3) The simulation results are analyzed, the estimation of the estimated and variance is given, and the model is improved if necessary to improve the estimation accuracy and the efficiency of the simulation calculation.
15. What are the coping strategies for negative risk? One example shows. Remember
For:
(1) Evasion: for example, to extend the schedule or reduce the scope.
(2) Transfer: For example, to sell or outsource a part of the business that you are not good at or to carry out a greater risk for yourself, to focus on your core business and effectively transfer the risk.
(3) Mitigation: For example, the use of less complex processes, the implementation of more testing, or the use of more stable and reliable sellers can mitigate the risk.
16. What are the strategies to respond to positive risks? One example shows. Remember
For:
(1) Development: For example, if an organization wants to ensure that opportunities are fulfilled, it can take the risk of having a positive impact.
(2) Sharing: for example, assigning risk responsibility to third parties that are best able to gain access to the benefits of the project, including establishing a risk-sharing partnership, or forming a team, a special purpose project company, or a joint venture that is specifically for the purpose of opportunity management.
(3) Improve: For example, by increasing the probability of positive risk or its positive impact, identifying and maximizing the drivers of these positive risks, and working to change the "size" of opportunities.
17. What are the strategies for applying both negative and positive risks? What are the 2 kinds of cases? Sample. Remember
For:
(1) Acceptance, it is divided into active and passive two ways.
(2) Proactively accepting risks, for example, establishing emergency reserves to address known or potentially unknown threats or opportunities.
(3) Passively accept the risk, for example, do not take any action, leave the risk to the project team, when the risk occurs as appropriate.
18, why to establish a risk warning system?
A: The significance of risk monitoring is to achieve the effective management of project risks, eliminate or control the occurrence of project risks or avoid adverse consequences. Therefore, the establishment of an effective risk early warning system, the effective monitoring of the risk of an important role and significance.
19. What are the specific methods of risk monitoring?
For:
(1) Risk re-evaluation.
(2) Risk audit.
(3) Variance and trend analysis.
(4) Technical performance measurement.
(5) Reserve Fund analysis.
(6) Status Review Meeting.
Second, the project closure management
1. What are the contents of the project closure? Remember
Answer: Project acceptance, project summary and project evaluation audit.
2. What are the steps for the acceptance of the system integration project?
Answer: System testing → system test run → system document acceptance → final acceptance report of the project.
3. What are the significance of the project summary?
For:
(1) Understand the work of the whole project and the performance status of the related team or members.
(2) Understand the problems and summarize the improvement measures.
(3) Understand and summarize the experience that is worth absorbing during the whole project.
(4) After the summary of the document to discuss, through the deposit into the company's knowledge base, thereby incorporating the enterprise's process assets.
4. What should be discussed in general project summary?
A: Project performance, technical performance, cost performance, schedule performance, project communication, identification issues and problem solving, comments and suggestions.
5. What are the follow-up work of software projects?
For:
(1) Modification of software bug.
(2) Software upgrade.
(3) Follow-up technical support.
6. What are the follow-up work of system integration project?
For:
(1) The Daily maintenance of information system.
(2) Update of hardware products.
(3) New requirements for information systems.
7. What are the transfer processes for general project personnel? Remember
For:
(1) The project team member management plan, that is, the project human Resources Management plan describes the personnel transfer conditions have been triggered.
(2) The tasks undertaken by the project team members have been completed, the confirmed deliverables have been submitted and the work handover has been completed.
(3) The project manager and the project team member confirm that the work cohesion of the member has been finished or completed.
(4) The project manager issues the project team member transfer confirmation file.
(5) The project manager issues the performance appraisal documents of the project team members.
(6) The project manager informs all relevant stakeholders.
(7) If the project closure of all project members to close the project work, should convene a project Summary commendation Conference, affirmation of the results of the project, team members performance, while summing up the project experience and lessons.
III. Management of intellectual property rights
1. What is the scope of intellectual property?
A: The scope of intellectual property rights is the right of copyright, patent, trademark and the derivative or combination of the three.
2. What is a deductive work?
A: New works based on the re-creation of existing works are collectively referred to as deductive works.
3. What is a work of duty? What are special job titles?
For:
(1) The work of a job is a work created by the citizen of the employee to fulfill the task of the Organization.
(2) Special Duty works refers to the work of general duty, except the right of attribution, other rights of copyright shall be enjoyed by the unit.
4. How many years is the protection period for copyright and neighboring rights?
A: 50, as of December 31 of the 50th year after the first publication of the work.
5, the Invention Patent, utility model, design patent right, the term is the number of years respectively? When is it calculated?
A: The term of the invention patent is 20, the use of the new patent and design patent rights for the period of 10, are calculated from the date of application, the application date here is pointed to the State Council to seize your administrative department to file a patent application date.
6. Judgment: Intellectual property rights have regional and temporal nature.
Answer: Yes.
This article from "11233637" blog, declined reprint!
Soft examinations High Students: April 6, 2016 jobs