Milestones are used to ?
Know the cost of the project
Know the status of the project
Know the user expectations
None of the above

1 Answer

Answer :

Know the cost of the project

Related questions

Description : Which one of the following best describes project success criteria? a. Actively seeking some senior management support. b. Measures by which the success of the project is judged. c. Achievement of milestones. d. A motivated project team.

Last Answer : b. Measures by which the success of the project is judged.

Description : Boehm suggests an approach that addresses project objectives,  milestones and schedules, responsibilities, management and  technical approaches and required resources, This principle is  called as . a. W3HH principle b. WHO principle c. W5HH principle d. None of the above.

Last Answer : c. W5HH principle

Description : Which one of the following best describes project success criteria?  a. Actively seeking some senior management support.  b. Measures by which the success of the project is judged.  c. Achievement of milestones.  d. A motivated project team.

Last Answer : b. Measures by which the success of the project is judged.

Description : Each project phase is marked by completion of one or more: 1. Tasks.  2. Milestones  3. Deliverables  4. Life cycles

Last Answer : 3. Deliverables

Description : (1)Milestones established by the customer must be adhered to by: 1. Project manager  2. Functional managers  3. The customer 4. Both a and b

Last Answer : 4. Both a and b

Description : Which one from the following is highly associated activity of project planning? (A) Keep track of the project progress. (B) Compare actual and planned progress and costs (C) Identify the activities, milestones and deliverables produced by a project (D) Both (B) and (C)

Last Answer : (C) Identify the activities, milestones and deliverables produced by a project

Description : Which one of the following statements is true? a. Independent reviews and quality audits form part of quality assurance to ensure the project manager delivers on time and to budget. ... Quality planning enables the project manager to manage the trade-off between customer expectations  and budget

Last Answer : c. Quality control verifies that the project deliverables conform to specification, are fit for purpose and  meet stakeholder expectations.

Description : Which one of the following statements is true?  a. Independent reviews and quality audits form part of quality assurance to ensure the project  manager delivers on time and to budget. ... planning enables the project manager to manage the trade-off between customer  expectations and budget.

Last Answer : c. Quality control verifies that the project deliverables conform to specification, are fit for  purpose and meet stakeholder expectations.

Description : A set of information that defines the status of resources allocated to a process is a. Process control b. ALU c. Register Unit d. Process description

Last Answer : Process description

Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b

Last Answer : B. -i

Description : Which of the following is present in both an HTTP request line and a status line? A. HTTP version number B. URL C. Method D. None of the above

Last Answer : A. HTTP version number

Description : Information hiding is to hide from user, details ? that are relevant to him that are not relevant to him that may be maliciously handled by him that are confidential

Last Answer : that may be maliciously handled by him

Description : Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identica

Last Answer : User exec is a subset of the privileged exec

Description : User programmable terminals that combine VDT hardware with built-in microprocessor is a. Kips b. PC c. Mainframe d. Intelligent terminals

Last Answer : Intelligent terminals

Description : Which statement is valid about computer program? a. It is understood by a computer b. It is understood by programmer c. It is understood user d. Both of above

Last Answer : Both of above

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above

Last Answer : mail gateway

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : A front-end processor is A. a user computer system B. a processor in a large-scale computer that executes operatingsystem instructions C. a minicomputer that relieves main-frame computersat a ... centre of communications control functions D. preliminary processor ofbatch jobs. E. None of the above

Last Answer : a minicomputer that relieves main-frame computersat a computer centre of communications control functions

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which layer provides the services to user? a.application layer b.session layer c.presentation layer d.physical layer

Last Answer : a.application layer

Description : Which of the following layers of the OSI model is responsible for user interaction? a.Layer 4 b.Layer 5 c.Layer 6 d.Layer 7

Last Answer : d.Layer 7

Description : Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose? a. Authorization Phase b. Transaction Phase c. Update Phase d. All of the above

Last Answer : b. Transaction Phase

Description : Which among the below specified illustrations belongs to the category of GUI based user agents? a. mail b. pine c. Outlook & Netscape d. All of the above

Last Answer : c. Outlook & Netscape

Description : In OSI model, which of the following layer transforms information from machine format into that understandable by user a. application b. session c. presentation d. physical

Last Answer : c. presentation

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Bit stuffing refers to a. inserting a 0 in user stream to differentiate it with a flag b. inserting a 0 in flag stream to avoid ambiguity c. appending a nipple to the flag sequence d. appending a nipple to the use data stream

Last Answer : a. inserting a 0 in user stream to differentiate it with a flag

Description : Which layer provides interface between network support layers and user support layers? a. session layer b. data link layer c. transport layer d. network layer

Last Answer : c. transport layer

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : Which among the below specified illustrations belongs to the category of GUI based user agents? A. mail B. pine C. Outlook D. All of the above

Last Answer : C. Outlook

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : Radio channels are attractive medium because __________ a) Can penetrate walls b) Connectivity can be given to mobile user c) Can carry signals for long distance d) All of the mentioned

Last Answer : d) All of the mentioned

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : What is the difference between a user agent (UA) and a mail transfer agent (MTA)?

Last Answer : The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.

Description : _________ service helps user in knowing their Aadhaar Seeding status with their bank account. A. WAP B. QSAM C. NUUP D. Both (A) and (B) E. Both (B) and (C)

Last Answer : B. QSAM Explanation: QSAM (Query Service on Aadhaar Mapper) – This service helps user in knowing their Aadhaar Seeding status with their bank account

Description : When companies market products on the basis of what the product's attributes will do for a given segment of consumers, they are using a powerful form of behavioral segmentation known as: A. ... segmentation. B. benefit segmentation. C. user status segmentation. D. usage rate segmentation.

Last Answer : B. benefit segmentation.

Description : When did Fluther get started? Any major milestones and game changers since the beginning?

Last Answer : Welcome to Fluther. I believe it started in 2007. I've been here since the end of 2009. It was a large-ish site. What set it apart was the rule requiring high writing standards. Also, we ... us their questions, and the community will do its best to try to get accurate information. Enjoy yourself.

Description : Do you have any particular milestones that made you feel like an adult?

Last Answer : When I got married the first time. Ha Ha what a laugh. I got divorced 7 years later and have been regressing ever since :p

Description : Some adults are said to have a mind of a child, but what about the rest of the population? What milestones should the rest of the age groups have to belong to a certain mental age?

Last Answer : answer:Good question Well it really is simplified into personality trait, one with the mind of a child is mentally immature whereas a mature individual or normal person is more settled in ... is more conditioned to respond to the responsibilities and events involved at that certain stage in life