The (1) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several (2).
空白(2)处填()
A.workflow engines
B.processes
C.workflow threads
D.tasks
您可能感兴趣的试卷
你可能感兴趣的试题
The (1) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several (2).
空白(1)处填()
A.waterfallmodel
B.workflowreferencemodel
C.evolutionarymodel
D.spiralmodel
Estimating schedule activity costs involves developing an (1) of the cost of theresources needed to complete each schedule activity. Cost estimating includes identifying and considering various costing alternatives. for example, in most application areas, additionalwork during a design phase is widely held to have the potential for reducing the cost of the execution phase and product operations. the cost estimating process considers whether the expected savings can offset the cost of the additional design work. cost estimates are generally expressed in units of (2) to facilitate comparisons both within and across projects.the (3) describes important information about project requirement that is considered during cost estimating.
空白(3)处填()
A.project scope statement
B.statement of work
C.project management plan
D.projectpolicy
Your project is behind schedule due to conflict between team members . Havingresolved the conflict, to get the project back on schedule , you should consider ().
A.crashing the schedule
B.performing resource leveling
C.conducting reverse resource allocation scheduling
D.utilizing the critical chain resources
An example of scope verification is ().
A.review the performance ofan installed software module
B.managing changes to the project schedule
C.decomposing the WBS to a work package level
D.performing a benefit/cost analysis to determine if we should proceed with the project
The TCP protocolis a ()layer protocol.
A.physical
B.network
C.transport
D.application
最新试题
空白(1)处填()
There are strategies typically deal with threats or risk that may have negative impacts on project objectives if they occur, some other strategies are suggested to deal with risks with potentially positive impacts. ()is a risk response strategy that may be adopted for either threats or opportunities.
空白(1)处填()
空白(1)处填()
空白(2)处填()
空白(5)处填()
Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes.()is not a project configuration management tool.
An activity has an early start date-of the lOth and a late start date of the 19th. The activity also has a duration of 4 days. There are no nonworkdays. From the information given, ()what can be concluded about the activity?
空白(1)处填()
The connection between two networks from an intemet is handled by a machine known as a()