logo

CuriousTab

CuriousTab

Discussion


Home Certification PMP Certification See What Others Are Saying!
  • Question
  • Why are CPM, GERT, and PERT not considered sufficient to create a project schedule?


  • Options
  • A. All three are tools and techniques of schedule development, not the actual schedule
  • B. As mathemetical analysis tools, they simply provide the dates that are posible, and do not consider resource pool limitations
  • C. They are sufficient. Each calculates early and late start and finish dates for each activity
  • D. They are Monte Carlo techniques used to provide what-if analysis for adverse external factors on a project

  • Correct Answer
  • As mathemetical analysis tools, they simply provide the dates that are posible, and do not consider resource pool limitations 

    Explanation

    Answer A is tempting because it is true by definition, but Answer B is correct because it properly answers the question, in that these techniques do not take into account resource pool constraints. Answer C is incorrect because it provides possible early and late start and finish dates, but not the actual schedules. Answer D is incorrect because none of the the three are simulation techniques. 


  • More questions

    • 1. Which two descriptions are correct about characteristics of IPv6 unicast addressing? (Choose two) A. Global addresses start with 2000::/3. B. Link-local addresses start with FF00::/10. C. Link-local addresses start with FE00:/12. D. There is only one loopback address and it is ::1.
    • Discuss
    • 2. What are the six OSPF route types?
    • Discuss
    • 3. How many non- overlapping channels are available with 802.11b?

    • Options
    • A. 3
    • B. 12
    • C. 23
    • D. 40
    • Discuss
    • 4. Which IEEE committee has been sanctioned by WAP and is called WPA2?
    • Discuss
    • 5. When a station sends a transmission to the MAC address ff : ff : ff : ff : ff : ff, what type of transmission is it?

    • Options
    • A. Unicast
    • B. Multicast
    • C. Anycast
    • D. Broadcast
    • Discuss
    • 6. In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

    • Options
    • A. All hosts have equal priority
    • B. The two hosts that caused the collision will have equal priority
    • C. The host that sent the jam signal after the collision
    • D. The host with the highest MAC address
    • Discuss
    • 7. What is the Classs A Private IP address space?
    • Discuss
    • 8. What is the Class C private IP address space?
    • Discuss
    • 9. To use VLSM, what capability must the routing protocols in use possess?

    • Options
    • A. Support for multicast
    • B. Multi-protocol support
    • C. Transmission of subnet mask information
    • D. Support for unequal load balancing
    • Discuss
    • 10. If you wanted administrators to see a message when logging into the router, which command would you use?

    • Options
    • A. message banner motd
    • B. banner message motd
    • C. banner motd
    • D. message motd
    • Discuss


    Comments

    There are no comments.

Enter a new Comment