Tenth session of the Trainer Training (risk Management + Project closure Management + Intellectual property management)

Source: Internet
Author: User

18th Chapter Risk Management


1. What are the six processes of risk management? Remember

The project risk management process includes the following:

(1). Risk management planning.

(2). Risk identification.

(3). Qualitative risk analysis.

(4). Quantitative risk analysis.

(5). The plan should be prepared.

(6). Risk monitoring.


2. What is contingency plan? Please give an example.
Contingency planning is a predetermined measure that the project team will take when a possible risk event actually occurs. For example, when the project manager is based on the actual progress of a new software product development, it is expected that the software development results will not be integrated in a timely manner in a contract-based information system project, and they will initiate contingency plans, such as taking a small amount of necessary changes to the existing version of the SOFTWARE PRODUCT.


3, what is the emergency reserve? Please give an example.

Contingency reserve refers to the project sponsor's provisions, if the scope of the project or quality changes, this part of the funds can reduce costs or schedule risk. For example, if a project deviates from the trajectory due to an employee's lack of experience with the use of some new technologies, the project sponsor can pull out a portion of the funds from the contingency reserve, hire an external consultant, and provide training and advice to the project members on the use of new technologies.


4. What are the differences between risk and risk factors?

The risk accident is the direct or the external reason which causes the loss, is the loss the medium material, namely the risk only through the risk accident occurrence can cause the loss. If it is an indirect cause of loss, it becomes a risk factor.


5. What are the characteristics of risk identification?

Features of risk identification include:

(1). Full-fledged sex.

(2). Systematic.

(3). Dynamic nature.

(4). Information dependencies.

(5). Comprehensive.


6. What are the steps of risk identification?

(1). Collect information.

(2). Risk situation Assessment.

(3). Identify potential risks based on direct or indirect symptoms.


7. Methods, techniques and tools for risk identification? (Answer all but remember the first three)

(1). Delphi Technology.

(2). Brainstorming method.

(3). SWOT analysis method.

(4). Check the table.

(5). Graphic technology.


8. What is Delphi technology?

Delphi Technology is a way for many experts to agree on a particular topic. The project wind management experts participate anonymously in this activity. The moderator consulted the questionnaire about the risks of important projects, and the answers to the questionnaires were returned and aggregated, and then circulated among the experts, asking them to take a step to express their views. After several rounds of this process, it is not difficult to arrive at a coherent view of the major project risks. Delphi technology helps to reduce bias in data and prevents any individual from having too much of an undue impact.


9, what is the SWOT analysis method?

SWOT analysis method is an environmental analysis method. The so-called SWOT is the abbreviation of English strength (advantage), weakness (disadvantage), Opportunity (opportunity) and threat (challenge).


9. What are the five steps of SWOT analysis? Remember

(1). List the strengths and weaknesses of the project, possible opportunities and threats.

(2). Internal Advantage + External Opportunity =SO Strategy, seize the opportunity to play an advantage.

(3). Internal disadvantage + external opportunity =WO Strategy, take advantage of opportunities to overcome weaknesses.

(4). Internal Advantage + External threat =st strategy, leveraging advantages to mitigate threats.

(5). Internal disadvantage + External challenge =WT strategy to compensate for shortcomings and avoid threats.


10. What are the graphic techniques in risk identification? Remember

(1). Cause and Effect diagram, also known as Ishikawa map or fishbone diagram, is used to identify the cause of the risk.

(2). A system or process flowchart showing how the various elements of the system relate to each other and the causal conduction mechanism.

(3). Impact diagram, showing causal effects.


11. What are the methods of qualitative risk analysis?

(1). Risk probability and impact assessment.

(2). Probability and impact matrix.

(3). Risk classification.

(4). Risk Urgency Assessment


12, for high risk, medium risk, low risk, what measures are taken separately? Remember

High risk, need to take priority measures, and adopt a positive response strategy.

Need to take action and respond to the strategy.

Low risk, simply put it in the list of risks to be observed or allocate additional contingency reserves, without any other immediate direct management measures.


13. What are the quantitative risk analysis methods? Remember

(1). Expected currency value.

(2). Calculate the analysis factor.

(3). Planning review techniques.

(4). Monte Carlo (Monte Carlo) analysis.


14. What is the definition and procedure of Monte Carlo analysis?

Monte Carlo analysis, also known as stochastic simulation method, the basic idea is to establish a probabilistic model or stochastic process, so that its parameters equal to the solution of the problem, and then through the model or process of observation to calculate the statistical characteristics of the parameters, and finally give the desired value of the problem, the accuracy of the solution can be expressed by the standard error estimates. The steps are as follows:

(1). To establish a simple and easy-to-implement probabilistic statistical model for realistic problems, so that the solution is exactly the probability distribution of the model established or some of its numerical characteristics, such as the probability of an event or the expected value of the model.

(2). A sampling method is established for random variables in the model, and a simulation experiment is carried out on the computer to extract enough random numbers and to count the related events.

(3). The simulation results are analyzed, the estimation of the estimated and variance is given, and the model is improved if necessary to improve the estimation accuracy and the efficiency of the simulation calculation.


15. What are the coping strategies for negative risk? One example shows. Remember
(1). Circumvent, change the project plan to exclude risks or conditions, or to protect the project objectives, to keep them unaffected, or to relax some of the targets that are threatened. For example, to extend progress or reduce scope, etc.

(2). Transfer, in an attempt to transfer the outcome of the risk together with the responsibility for the response to the other party. For example, the use of insurance, performance bonds, letters of guarantee and bonds.

(3). Mitigation. Try to reduce the probability or consequences of an adverse risk event to an acceptable threshold. For example, setting up redundant components in a subsystem at design time can mitigate the impact of legacy component failures.


16. What are the strategies to respond to positive risks? One example shows. Remember

(1). Development, such as the allocation of more resources to the project capacity.
(2). Sharing, such as establishing a risk-sharing partnership, or a team specifically designed for opportunity management, a special project company, or a joint venture.
(3). Improve, actively strengthen its trigger conditions, increase the probability of chance occurrence.


17. What are the strategies for applying both negative and positive risks? What are the 2 kinds of cases? Sample. Remember

(1). The strategy for applying both negative and positive risks is to receive, target opportunities or threats, and use the strategy.

(2). This strategy can be divided into active or passive ways. The most common way to proactively accept risk is to set up emergency reserves to deal with a potential threat or opportunity. Passively accepting the risk does not require any action to be taken and left to the project team, subject to the situation when the risk occurs.


18, why to establish a risk warning system?

Because of the innovation, one-time, uniqueness and complexity of the project, the inevitability of the project risk is determined, and the loss after the risk is difficult to compensate and the passivity of the work determines the importance of risk management. Traditional risk management is a kind of "retrospective" management, which is a remedy for some major projects. The significance of risk monitoring is to achieve the effective management of project risks, eliminate or control the occurrence of project risks or avoid adverse consequences. Therefore, the establishment of an effective risk early warning system for the effective monitoring of risk has important role and significance.


19. What are the specific methods of risk monitoring?

(1). Risk re-evaluation.

(2). Risk audits.

(3). Variance and trend analysis.

(4). Technical performance measurement.

(5). Reserve Fund analysis.

(6). Status Review Meeting.




The 19th chapter of project Closure management


1. What are the contents of the project closure? Remember

(1). Project acceptance.

(2). Project Summary.

(3). Project Evaluation Audit.


2. What are the steps for the acceptance of the system integration project?

(1). System test.

(2). Test run of the system.

(3). Document acceptance of the system.

(4). Final acceptance report of the project.


3. What are the significance of the project summary?

(1). Understand the work of the whole project and the performance of related team or members.

(2). Understand the problems and summarize the improvement measures.

(3). Understand and summarize the experiences that are worth absorbing during the whole project.

(4). After the summary of the document to discuss, through the deposit into the company's knowledge base, so that the person's enterprise process assets.


4. What should be discussed in general project summary?

(1). Project performance.

(2). Technical performance.

(3). Cost performance.

(4). Schedule performance.

(5). Project Communication.

(6). Identify problems and resolve issues.

(7). Comments and suggestions.


5. What are the follow-up work of software projects?

(1) Modification of software bug.

(2) Software upgrade.

(3) Follow-up technical support.


6. What are the follow-up work of system integration project?

(1). Information System routine maintenance.

(2). Updates to hardware products.

(3). New requirements for information systems.


7. What are the transfer processes for general project personnel? Remember

(1). The management plan of the project team members, that is, the personnel transfer conditions in the project manpower plan have been triggered.
(2). The responsibilities of the Members have been fulfilled and the deliverables have been submitted and the handover of the work has been completed.
(3). Project managers and project members confirm that the work of the member has been completed.
(4). The project manager issues the project team member transfer confirmation file.
(5). The project manager issues a performance appraisal document for the project team members.
(6). The project manager informs all relevant stakeholders.
(7). If the project close all the members to complete the project work, the call Project summary Commendation, affirmation of the project results, team members results, while summing up the project experience and lessons.


20th Chapter Intellectual Property Management


1. What is the scope of intellectual property?

The scope of intellectual property rights is the right of copyright, patent, trademark and the derivative or combination of the three.


2. What is a deductive work?

A new work produced by a deductive work based on the creation of an existing work is collectively referred to as a deductive work. Deductive works are mainly adapted, translated, annotated, commented and collated.


3. What is a work of duty? What are special job titles?

A work created as a citizen of an employee for the completion of a work assignment in a unit. There are two prerequisites for the determination of the work of a job: first, there are labor relations between the author and the unit, and the creation of the works belongs to the author's scope of responsibility.

Special Job Title: Engineering design, product design drawings, computer software and maps to a science and technology works.


4. How many years is the protection period for copyright and neighboring rights?

The protection period of neighboring rights is the same as that of copyright, and the term of protection is 50, as of December 3I of the 50th year after the work was first published. Among them, the individual refers to the death of a natural person, an individual lifetime effective. The unit is December 31 of the 50th year after the first publication.


5, the Invention Patent, utility model, design patent right, the term is the number of years respectively? When is it calculated?

The term of the invention patent is 20, the term of the patent right to use the new patent and design is 10, which is calculated from the application date.


6. Judgment: Intellectual property rights have regional and temporal nature.

Right, intellectual property rights are regional and time-related.

This article from "11139618" blog, declined reprint!

Tenth session of the Trainer Training (risk Management + Project closure Management + Intellectual property management)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.