Configuration management is a technique for______.

A:overall change control B:project plan execution C:scope planning D:risk quantification

Configuration management is______.

A:used to ensure that the description of the project product is correct and complete B:the creation of the work breakdown structure C:the set of procedures developed to assure that project design criteria are met D:a mechanism to track budget and schedule variances

Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes,()is not a project configuration management tool.

A:Rational Clearcase B:Quality Function Deployment C:Visual SourceSafe D:Concurrent Versions System

Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes.() is not a project configuration management tool.

A:Rational Clearcase B:Quality Function Deployment C:Visual SourceSafe D:Concurrent Versions System

Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes.(74) is not a project configuration management tool.

A:Rational Clearcase B:Quality Function Deployment C:Visual SourceSafe D:Concurrent Versions System

Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host. Automated configuration methods, such as(), are required to solve the problem.

A:IPSec B:DHCP C:PPTP D:SOAP

Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host.Automated configuration methods, such as (), are required to solve the problem.

A:IPsec B:DHCP C:PPTP D:SOAP

A project manager believes that modifying the scope of the project may provide added value service for the customer. The project manager should A.assign change tasks to project members B.call a meeting of the configuration control board C.change the scope baseline D.postpone the modification until a separate enhancement project is funded after this project is completed according to the original baseline ().

A:assign change tasks to project members B:call a meeting of the configuration control board C:change the scope baseline D:postpone the modification until a separate enhancement project is funded after this project is completed according to the original baseline

Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host .Automated configuration methods such as (), are required to solve the problem.

A:IPsec B:DHCP C:PPTP D:SOAP

Configuration management is the process of managing change in hardware, software, firmware, documentation, measurements, etc. As change requires an initial state and next state, the marking of significant states within a series of several changes becomes important. The identification of significant states within the revision history of a configuration item is the central purpose of ______ identification.

A:baseline B:value C:cost D:Control

微信扫码获取答案解析
下载APP查看答案解析