...Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and have cost estimates. Networks provide the project schedule by identifying dependencies, sequencing, and timing of activities. 2. How are WBS and project networks linked? Project networks are developed from the WBS. Work packages from the WBS are used to build the activities found in the project network. The network uses the time estimates from the WBS to generate dates for the project. Integration of the WBS and project network is crucial to effective project management. 3. Why bother creating a WBS? Why not go straight to a project network and forget the WBS? Project networks depend on the WBS because work packages from the WBS are used to develop the project network. A network activity can include one or more work packages but all activity time estimates are derived from the task times in the work package. Unlike the project network, the WBS defines all the elements of the project in a hierarchical framework and establishes their relationships to project deliverables. 4. Why is slack important to the project manager...
Words: 541 - Pages: 3
...I did youre full essay answer thank you pls upload it thank you 1. Discuss why companies “go international,” giving specific reactive and proactive reasons. Companies go international for many reasons, including reactive ones, such as international competition, trade barriers, and customer demands. Proactive reasons include seeking economies of scale, new international markets, resource access, cost savings, and local incentives. Those companies which are proactive in establishing a presence in many countries from their outset are referred to as “Born Globals.” 2. Explain the process of environmental assessment. What are the major international variables to consider in the scanning process? Discuss the levels of environmental monitoring that should be conducted. How well do you think managers conduct environmental assessment? Environmental assessment is the first major way to weighing international strategic. The assessment includes environmental scanning and continuous monitoring to keep abreast of variable around the world that are pertinent to the firm and that have the potential to shape its future by posing new opportunities. Environmental scanning is the process of gathering information and forecasting relevant trends, competitive actions, and circumstances that will affect operations in geographic areas of potential interest. Scanning should focus on the future interests of the firm should cover the following major variables. 3. 4. Discuss the...
Words: 285 - Pages: 2
...enterprise environment consisting of four domains in separate locations. Your network is becoming increasingly difficult to manage due to the number of users in separate geographic locations. Each location has people who are willing to learn to maintain their part of the network. In addition, as departments grow, you want each department to have control over their user accounts and resources. The CEO has asked you to come up with a plan to set up decentralized administration. What will you include in your plan? A: Delegation of control to each admin of each sub-domain, Standardized naming system for OU’s computers, and users. 5. Which tool must you use to move a user object from one domain to another domain? A: c. Movetree 6. You are attempting to use the Run As program to open Active Directory Users And Computers, but you receive an error message and are unable to do this. What should you check? A: d. Check to make sure the Secondary Logon...
Words: 425 - Pages: 2
...command line. 2. Which of the following shells enable the use of scripts? (Choose all that apply.) A. Bash B. csh D. zsh 3. You frequently use the command ls-a and want to save time by just entering l to do the same thing. Which of the following commands enables you to set your system to view hidden files by only entering l? D. alias l= "ls -a" 4. You have written a script, but when you run it there is an error. Which of the following commands can you use to debug your script? (Choose all that apply.) B. sh -v D. sh –x 5. You have written a shell program that creates four temporary files. Which of the following commands can you use to remove these files when the script has completed its work? A. trap 6. Which of the following commands work well for menus used in a script? (Choose all that apply.) B. case 7. You are currently in the soruce directory, which is the new directory you have just created for storying and running your scripts. You want to make certain that the source directory is in your default path. Which of the following commands enable you to view the current default path settings? D. echo $PATH 8. You have created a script for use by your entire department in a commonly accessed directory. Only you are able to run the script, which works perfectly. Which of the following is likely to be the problem? B. You did not give all users in your department execute permissions for that script. 9. For which of...
Words: 356 - Pages: 2
...Chapter 6 Review Questions Andrea Ley Berenz INF 336 Prof. Lori Deere August 2, 2013 Chapter 6 Review Questions * Describe the differences between needs identification and defining commercial equivalents and discuss why it is preferable to separate into two stages. The first two steps of the acquisition process are essential to meeting the needs of the company properly. Needs identification is where a purchase begins and when the what, the how much and the when something is needed is determined. When this is done, figuring out the options available to fulfill that need and making sure that it is described in a way that potential suppliers will understand, or defining the commercial equivalent, takes place. I believe that the textbook describes it best: “Many options exist for fastening two pieces of wood together. Using a nail is only one option. Grooving the two pieces of wood using a staple, bolt or screw, or glue are others. Specifying the need first and then identifying the variety of options to meet the need leave the door open to lower cost and better, more innovative, solutions.” (Johnson, Lendeers & Flynn, 2011) These two steps are best tackled separately as making sure that the need is correctly explained will ensure the correct solution is found and that the option chosen is the right fit for the company. * Interpret the value to the organization when early supplier involvement (ESI) is implemented effectively. “Early supply involvement...
Words: 647 - Pages: 3
...Chapter 6 Essay Question In the case of Ron and Lois, they are both department managers with Litwins department store. Lois is the manager of housewares department and Don is the manager of the shoe department. Ron has observed Lois taking inventory from her own department home, apparently without paying for it. He hesitates confronting Lois because he is due to be promoted, and needs Lois' recommendation. He also does not want to notify the company management directly, because he doesn't want an ethics investigation on his record, believing that it will give him a “goody-goody” image. This week, Lois tried on several pairs of expensive running shoes in his department before finding a pair that suited her. She did not, however, buy them. That very pair was missing this morning. Part one In the business world, you will sometimes be called on to weigh the ethics of decisions that can affect not just your own future but possibly the futures of your fellow workers, your company and its customers. It’s not always easy to distinguish between what is right and wrong in many situations. (Boone & Kurtz, 2011) In part one of this paper, I will define ethics and look at how ethics played a role in management as well as provide solutions. In this case Ron has an ethical dilemma, if he says something about what he has observed, Lois may not recommend him for the promotion and if he does not say anything about what he has seen, he may be fired if and when Lois gets caught. Ethics is...
Words: 1042 - Pages: 5
...Do 1 and 3 in chapter 5, and questions 8 and 9 in chapter 6. For Chapter 5 question 1: One of the potential problems mentioned in the chapter with gathering information requirements by observing potential system users is that people may change their behavior when observed. What could you do to overcome this potential confounding factor in accurately determining information requirements? (5 points) There is no doubt that an employee may change their attitude or work behavior when they are being observed. One thing that I would do is keep observing the employee, however informing the employee before the observation would allow the employee to attempt to work with their best quality while being observe. This will allow the observer to identify the issues that the worker really has. For Chapter 5 question 3: Suppose you were asked to lead a JAD session. List ten guidelines you would follow in playing the proper role of a JAD session leader. (5 points) Chap 5, Question 3: Ten Guidelines listed 1. Limit the distraction to focus on meeting 2. Set an agenda and keep the session on track 3. Always remain neutral 4. Identify and address critical political and organizational issues early 5. Establish the executive sponsor as the tiebreaker 6. Facilitator should be train and be critically involved 7. Team attendance and participation are mandatory 8. Respond to ideas that relate to the project 9. Keep the team in check on topics that relate to the meeting 10. Involve...
Words: 353 - Pages: 2
...|Under LIFO, ending inventory will consist of 8,000 units from the inventory at Jan. 1 and 1,000 units from the June 19 purchase. Therefore,| |ending inventory is (8,000 X $11) + (1,000 X $12), or $100,000. | | | | Tinker Bell Company has the following: | | | | |$100,000 | | |$113,000 | | |$108,000 | 2) |Inventory is written down to its market value when its value is less than its cost. | | | | When the current replacement cost of inventory is less than its cost, it is written down to |LIFO value. | | |Market value. | | |Average-cost value. | | |FIFO value. | 3) Gomez Company just took its physical inventory. The count of inventory items on hand at the company’s business locations resulted in a total inventory cost of $295,574. In reviewing the details of the count and related inventory transactions, you have discovered the following. |1 | | (c) LIFO Which method...
Words: 858 - Pages: 4
...BUS 309 WK 6 Quiz 5 Chapter 6 - All Possible Questions To Purchase Click Link Below: http://strtutorials.com/BUS-309-WK-6-Quiz-5-Chapter-6-All-Possible-Questions-BUS3096.htm BUS 309 WK 6 Quiz 5 Chapter 6 - All Possible Questions 1. In 2009 the FDA was empowered to regulate 1. Alcohol 2. Candy 3. Pornography 4. Cigarettes 1. Every year, consumer products electrocute approximately 1. 100 people a year 2. 200 people a year 3. 400 people a year 4. 600 people a year 1. The court case that established consumers’ rights to sue the manufacturer of products was 1. Roe v. Wade 2. Griggs v. Palmer 3. MacPherson v. Buick Motor Car 4. Brown v. Board 1. In 1972 Congress passed the 1. Consumer Produce Recall Act 2. Consumer Product Safety Act 3. Consumer Recall Liability Act 4. Consumer Product Liability Act 1. Had air bags been standard equipment in 1974, how many deaths might have been prevented? 1. 70,000 2. 80,000 3. 90,000 4. 100,000 1. When did a government agency begin testing candy for its potential to choke children? 1. 1987 2. 1997 3. 2000 4. 2003 1. Iacocca used to say “Safety doesn’t…” 1. Hurt 2. Sell 3. Corrupt 4. Produce 2. Cigarette fires are responsible for how many serious injuries a year? 1. 2000 2. 4000 3. 6000 4. 7000 1. The claim that a product is fit for its ordinary use is 1. An implied warranty 2. An explicit warranty 3. A condition of sale 4. A consumer risk 1. When manufacturers and retailers...
Words: 780 - Pages: 4
...BUS 309 WK 6 Quiz 5 Chapter 6 - All Possible Questions To Purchase Click Link Below: http://strtutorials.com/BUS-309-WK-6-Quiz-5-Chapter-6-All-Possible-Questions-BUS3096.htm BUS 309 WK 6 Quiz 5 Chapter 6 - All Possible Questions 1. In 2009 the FDA was empowered to regulate 1. Alcohol 2. Candy 3. Pornography 4. Cigarettes 1. Every year, consumer products electrocute approximately 1. 100 people a year 2. 200 people a year 3. 400 people a year 4. 600 people a year 1. The court case that established consumers’ rights to sue the manufacturer of products was 1. Roe v. Wade 2. Griggs v. Palmer 3. MacPherson v. Buick Motor Car 4. Brown v. Board 1. In 1972 Congress passed the 1. Consumer Produce Recall Act 2. Consumer Product Safety Act 3. Consumer Recall Liability Act 4. Consumer Product Liability Act 1. Had air bags been standard equipment in 1974, how many deaths might have been prevented? 1. 70,000 2. 80,000 3. 90,000 4. 100,000 1. When did a government agency begin testing candy for its potential to choke children? 1. 1987 2. 1997 3. 2000 4. 2003 1. Iacocca used to say “Safety doesn’t…” 1. Hurt 2. Sell 3. Corrupt 4. Produce 2. Cigarette fires are responsible for how many serious injuries a year? 1. 2000 2. 4000 3. 6000 4. 7000 1. The claim that a product is fit for its ordinary use is 1. An implied warranty 2. An explicit warranty 3. A condition of sale 4. A consumer risk 1. When manufacturers and retailers...
Words: 780 - Pages: 4
...Chapter 6 Quick Questions: International Trade Theory 1. What is the major benefit of trade identified in theories of international trade? 2. What do theories of international trade teach us about the patter of trade in the world economy? 3. How do trade theories inform government policy? 4. What are the main differences among mercantilism, Adam Smith’s theory of absolute advantage, and David Ricardo’s Theory of comparative advantage? 5. Why is the theory of comparative advantage so important in today’s world? 6. According to the theory of comparative advantage, what is the relationship between free trade and economic growth? Does the empirical evidence support this prediction? 7. What is the criticism that Paul Samuel made of theories that advocate free trade? 8. How is the Heckscher-Olin theory different from the theory of comparative advantage? 9. What is the Leontief paradox? Why is it important? 10. What are the central predictions of the product lifecycle theory? What are the limitations of this theory? 11. What does new trade theory tell us about the patter of trade in the world economy? 12. What are the implications of new trade theory for government policy? 13. According to Porter/s theory of national competitive advantage, what are the elements explain why different countries achieve international success in certain industries? 14. What are the implications of Porter’s Theory for government policy? 15. What...
Words: 618 - Pages: 3
...ACCT 305 Accounting Information Systems Chapter 6 Review Questions 1. Several Unique problems and risks associated with computerized information networks are unauthorized access, use, disclosure, disruption, modification, or destruction 2. Elements included in an ISMS system such as hardware, databases, procedures, and reports. 3. Development of ISMS requires application of the life cycle approach for system maintenance purposes. 4. Risk Management is the identification, assessment, and prioritization of risks. 5. Quantitative Approach - each loss exposure is computed as the product of the cost of an individual loss times the likelihood of its occurrence. Qualitative Approach – lists out the system’s vulnerabilities and threats and subjectively ranks them in order of their contribution to the company’s total loss exposures. 6. Types of threats that affect information systems a) Active threats include information systems fraud and computer sabotage. b) Passive threats include system faults, as well as natural disasters (e.g., earthquakes, floods, fires, and hurricanes). 7. Characteristics of white-collar criminal 8. Types of individuals pose a threat to an information system a) Computer and information systems personnel: are often given a wide range of access privileges to sensitive data and programs. b) Users: are given narrow access, but can still find ways to commit fraud. c) Intruders and attackers: are...
Words: 714 - Pages: 3
...BUS 230 WK 6 Quiz Chapter 7 - All Possible Questions To Purchase Click Link Below: http://strtutorials.com/BUS-230-WK-6-Quiz-Chapter-7-All-Possible-Questions-BUS2305.htm BUS 230 WK 6 Quiz Chapter 7 - All Possible Questions 1. Determination of the “best buy” is based on: a. technical considerations. b. quality issues. c. a balance between price and quality. d. an individual buyer’s perceptions. e. a balance of requirements of marketing, engineering, operations, and supply 2.. ISO 9001:2008 provides a tested framework for a systematic approach to consistently delivering product that satisfies customers’ expectations by managing: a. supplier relationships. b. total cost of ownership. c. process capability. d. six sigma. e. organizational processes. 3. A sampling technique that is based on the cumulative effect of information that every additional item in the sample adds as it is inspected is called: a. random sampling. b. sequential sampling. c. 100 percent testing. d. cumulative sampling. e. additive testing. 4. A process is capable when: 1. the supplier can predict the future distributions about the mean. 2. common causes are eliminated through process change. 3. it averages a set number of standard deviations within the specifications. 4. it produces the same exact result each time the activity is performed. 5. random causes are detected by statistical process controls and eliminated. 5. The role and responsibilities of supply may...
Words: 751 - Pages: 4
...BUS 230 WK 6 Quiz Chapter 7 - All Possible Questions To Purchase Click Link Below: http://strtutorials.com/BUS-230-WK-6-Quiz-Chapter-7-All-Possible-Questions-BUS2305.htm BUS 230 WK 6 Quiz Chapter 7 - All Possible Questions 1. Determination of the “best buy” is based on: a. technical considerations. b. quality issues. c. a balance between price and quality. d. an individual buyer’s perceptions. e. a balance of requirements of marketing, engineering, operations, and supply 2.. ISO 9001:2008 provides a tested framework for a systematic approach to consistently delivering product that satisfies customers’ expectations by managing: a. supplier relationships. b. total cost of ownership. c. process capability. d. six sigma. e. organizational processes. 3. A sampling technique that is based on the cumulative effect of information that every additional item in the sample adds as it is inspected is called: a. random sampling. b. sequential sampling. c. 100 percent testing. d. cumulative sampling. e. additive testing. 4. A process is capable when: 1. the supplier can predict the future distributions about the mean. 2. common causes are eliminated through process change. 3. it averages a set number of standard deviations within the specifications. 4. it produces the same exact result each time the activity is performed. 5. random causes are detected by statistical process controls and eliminated. 5. The role and responsibilities of supply may...
Words: 751 - Pages: 4
...type or select a data value, you use the: a. tag **** b. text string c. style sheet d. field set 2. If you don't include a type attribute, browsers assume you are creating a(n): a. file input box b. text input box ***** c. hidden input box d. image input box 3. What is required in the syntax when you need to refer to the control element? a. checkbox b. form label c. id attribute ******** d. name asterisk 4. The asterisk in Name* tells users that Name is a(n): a. id attribute b. required field ******* c. form label d. inline element 5. You create a selection list using the: a. id attribute b. name attribute c. option element d. selection element ******* 6. Which term defines the number of options that the selection list displays at one time? a. element b. control c. value **** d. field 7. Consider your audience and its initial reaction to a selection list when setting the: a. size attribute ****** b. list control c. style coding d. type option 8. The name attribute provides the name of the: a. field value b. selection list c. style sheet d. data field ***** 9. To create an option button, use the input element with the type attribute set to a value of: a. file b. image c. radio ******* d. text 10. When you use the same name for two or more option buttons, browsers treat them as a group, so selecting one option button...
Words: 449 - Pages: 2