The soft exam has ended, the answer is also here, let's take a look with Yueting Education!
System integration project management engineer in the first half of 2023
1. In the field of ( ) the mainland is far from reaching the world's advanced level, and it is necessary to give full play to the advantages of the new national system and concentrate the forces of both the government and the market to develop in an all-out manner.
A. Satellite navigation
B. Aerospace
C. Integrated circuits
D. High-speed rail
Reference answer: A
2. ChatGPT was released on November 30, 2022, and he is an AI-powered () tool.
A. Natural language processing
B. Data storage and processing
C. Network privacy and security
D. Data acquisition algorithm
Reference answer: A
Analysis: ChatGPT is an artificial intelligence technology-driven natural language processing tool, released by artificial intelligence research laboratory OpenAI on November 30, 2022, as a new chatbot model, it can learn and understand human language for dialogue, but also interact according to the context of the chat, truly like a human to chat and communicate, and even complete tasks such as writing emails, video scripts, copywriting, translation, code, etc.
3. () is not a basic principle of smart city construction.
A. People-oriented, pragmatic promotion
B. Adapt measures to local conditions, scientific and orderly
C. Government-led, collaborative innovation
D. Can be managed and controlled to ensure safety
Reference answer: C
Parse:
Basic principles of smart city construction:
(1) People-oriented, pragmatic promotion
(2) Adapt measures to local conditions, scientific and orderly
(3) Market-oriented, collaborative innovation
(4) It can be managed and controlled to ensure safety
4. The "14th Five-Year Plan" National Informatization Plan proposes to establish an efficient use of data element resource system, gather data management, (4), data application, authorization, security and privacy protection, risk management and control, etc., and explore multi-subject collaborative governance mechanisms.
A. Data masking
B. Data Collection
C. Sharing and openness
D. Information monitoring
Reference answer: C
Parse:
In the 14th Five-Year Plan for National Information Planning, (2) Establish an efficient use of data element resource system, Strengthen data governance, and strengthen data governance: strengthen national data governance coordination, and improve the data resource governance system system. Deepen the investigation of data resources, advance the establishment of a system of data standards and norms, formulate standards for data collection, storage, processing, circulation, trading, derivatives, and other such standards and regulations into the community to improve data quality and standardization. Establish and improve data management national standard examination and data governance capacity assessment systems. Standardize the use of measurement data, and carry out pilot projects for the construction and application of measurement data. Focus on data management, sharing and openness, data application, licensing, security and privacy protection, risk management and control, etc., and explore multi-subject collaborative governance mechanisms.
5. The "14th Five-Year Plan for the Deep Integration of Informatization and Industrialization" proposes to promote industrial digitalization and (), accelerate quality change, efficiency change and power change, empower the transformation and upgrading of traditional industries, expand the new engine of economic development, and provide strong support for the realization of the "New Four Modernizations".
A. Industrial informatization
B. Digital industrialization
C. Information industrialization
D. Digital industrialization
Reference answer: B
Parse:
During the "14th Five-Year Plan" period, through the deep integration of industrialization and industrialization, traders need to promote industrial digitalization and digital industrialization, accelerate quality transformation, efficiency change and power change, empower the transformation and upgrading of traditional industries, expand new engines of economic development, and provide strong support for the realization of the "new four modernizations".
6. Regarding the description of the construction and improvement of the public platform for e-government, it is incorrect: (6).
A. Complete the top-level design of the e-government public platform based on cloud computing
B. Comprehensively improve e-government technical service capabilities
C. Formulate e-government cloud computing standards and specifications
D. Policy orientation, comprehensively promote the migration of administrative systems to cloud computing models
Reference answer: D
Parse:
(1) Complete the top-level design of the e-government public platform based on cloud computing.
(2) Comprehensively improve the technical service capacity of e-government.
(3) Formulate e-government cloud computing standards and specifications.
(4) Encourage the migration to the cloud computing model, not fully implemented.
7. Adding redundant coding when encoding data is to improve the information system ().
A. Effectiveness
B. Reliability
C. Accuracy
D. Security
Reference answer: B
Parse:
The main performance indicators of the information system are: effectiveness and reliability. Effectiveness is about sending as much information as possible in the system; Reliability emphasizes the consistency of information transmission and reception to reduce distortion; The right amount of redundant encoding is an important measure to improve reliability.
8. Regarding the description of the information resource, it is incorrect:()
A. Can be reused, its value is reflected in use
B. Different information reflects the same value among different users
C. It is social public wealth and commodities that can be traded or exchanged
D. It has liquidity and can be transmitted quickly through the information network
Reference answer: B
Parse:
Compared with natural resources and material resources, information resources have the following seven characteristics:
(1) It can be reused, and its value is reflected in use;
(2) The use of information resources has a strong goal orientation, and different information reflects different values in different users;
(3) It is extensive. People search and use it regardless of time, space, language, geography and industry:
(4) It is social public wealth and commodities that can be traded or exchanged;
(5) It has liquidity and can be quickly transmitted through the information network;
(6) Polymorphism, information resources can exist in various forms such as numbers, text, images, sound, video, etc.;
(7) Integration, integrating different information resources and analyzing and mining, can obtain new knowledge and obtain higher value than decentralized information resources.
The three stages of the industrialization process of 9.IT services are ().
A. Product servitization, service standardization, service productization
B. Service standardization, product servitization, service productization
C. Product service, service productization, service standardization
D. Service standardization, service productization, product service
Reference answer: A
Analysis: The industrialization process of IT services is divided into product servitization, service standardization and service productization.
10. The description of software requirements analysis is incorrect: ().
A. Software requirements are descriptions of the characteristics to be solved
B. The requirements defined by the software requirements must be verifiable
C. Requirements analysis defines system boundaries but cannot resolve conflicts between requirements
D. When resources are limited, requirements can be weighed through priority
Reference answer: C
Parse:
A software requirement is a description of the characteristics of the problem to be solved. The defined requirements must be verifiable. When resources are limited, priority pairs can be trade-offs. Through requirements analysis, conflicts between requirements can be detected and resolved; Discover the boundaries of the system; and describe the system requirements in detail.
11. The purpose of the management review does not include ( ).
A. Monitor progress
B. Determine the status of the plan and progress
C. Evaluate software products
D. Evaluate the effectiveness of the management methods used to achieve the objectives
Reference answer: C
Analysis: The purpose of a management review is to monitor progress, determine the status of plans and progress, and evaluate the effectiveness of management methods used to achieve objectives. Technical review evaluates software products to determine their suitability for use intent.
12. Regarding the description of the basic concepts of object-orientation, it is correct ( ).
A. If a student is defined as a class, the college student is an object of it
B. Crows and magpies are inherited from birds
A class is an abstraction of an entity in the real world
D. The relationship between the class and the object can be understood as the object is the template of the class
Reference answer: B
Analysis: Inheritance is the derivation of new classes from existing classes, which can absorb the data properties and behaviors of existing classes and extend new capabilities.
13. Regarding the description of UML, it is incorrect ( ).
A. Applicable to various software development methods
B. Suitable for all stages of the software life cycle
C. It is more suitable for iterative development process
D. It is a visual programming language
Reference answer: D
Analysis: UML is a visual modeling language, not a programming language.
14. The description of the hierarchical pattern in software architecture design is incorrect (14)
A. Each layer provides services to the other layers
B. Each layer is allowed to be implemented in different ways
C. Each layer provides services through interfaces
D. Allow a complex problem to be implemented gradually and hierarchically
Reference answer: A
Analysis: The hierarchical pattern adopts a hierarchical organization, with each layer providing services to the previous layer and using the functions provided by the next layer. This pattern allows complex problems to be implemented step by step. Each layer in the hierarchical mode only affects up to two layers, as long as the same interface is provided to adjacent layers, each layer is allowed to be implemented in different ways, which can fully support software reuse. Typical applications of the layered model are layered communication protocols, such as ISO/OSI's seven-layer network model.
15. The description of the operational processing of the database is incorrect:()
A. It is the daily operation of the online database
B. It is the query and modification of records in the database
C. Used to provide decision analysis
D. Emphasize the response time of processing
Reference answer: C
Analysis: Traditional database technology is centered on a single data source, that is, database, daily transaction processing, batch processing, decision analysis, etc. There are two types of data processing work: operational processing and analytical processing. Operational processing, also known as affairs, refers to the daily operation of the online database, usually the query and modification of the records in the database, mainly for the specific application service of the enterprise, emphasizing the response time of processing, data security and integrity, etc.; Analytical processing is used for decision analysis of managers, often accessing large amounts of historical data.
16. The device accessing the network can be located through the IP address, based on the relevant protocol of the OSI model ( ).
A. Network layer
B. Transport layer
C. Session layer
B. Presentation layer
Reference answer: A
17.TCP/IP protocol behavior layer, the highest layer of which is equivalent to the ( ) layer of OSI.
A.5-7
B.5-6
C.4-6
D.4-5
Reference answer: A
18. ( ) is a wireless LAN application
A. A person rents a cloud service and publishes a personal website
B. The wireless cash register used in a shopping mall only needs to insert a SIM card
C. A library provides online inquiry and lending services
D. A university provides wireless campus network for teachers and students to use
Reference answer: D
19. A system sets permissions for the network, which requires login and secondary authentication to access, and the content that different people can access after logging in is different, which mainly meets the information security ( ).
(1) Confidentiality, (2) Integrity, (3) Availability, (4) Controllability, (5) Validity
A.①②④
B.①③④
C.①③④⑤
D.(1)(2)(3)(4)(5)
Reference answer: B
20. In the following network and information security products, ( ) acts like a black box on an aircraft.
A. Firewall
B. Scanner
C. Anti-virus software
D. Security audit system
Reference answer: D
21. The degree of standardization in the IoT architecture, the most mature is ( )
A. Perceptual layer
B. Network layer
C. Application layer
D. Application technology at each layer
Reference answer: B
22. Distributed parallel computing technology is mainly used in ( )
A. Data Collection
B. Data Storage
C. Data mining
D. Data visualization
Reference answer: C
23. () Not a feature of cloud computing.
A. High security
B. High reliability
C. Highly scalable
D. Hyperscale
Reference answer: A
24. Regarding the description of the project objectives, it is incorrect that: ( )
A.Project objectives include outcome objectives and binding objectives
B. Conflicts can also occur between the binding objectives of the project
C. The outcome objectives of the project may be referred to as project objectives
D. Project objectives are generally strategic objectives at the highest level
Reference answer: D
25. Regarding the description of the project management system, it is correct that: ( )
A. Project management systems usually do not need to be explained how to use them
B. The project management system must be formal
C. The project management system helps the project to be completed smoothly
D. The content of the project management system is not allowed to be changed
Reference answer: C
26. The organizational structure of the ongoing projects of the company has the following characteristics
(1) The project manager is responsible for the system and has clear project objectives;
(2) improved project manager's control over overall resources;
(3) Reduce the difficulty of coordination and cooperation between cross-functional departments;
(4) Team members have a sense of belonging, high morale, and few problems;
(5) multi-headed leadership;
(6) It is difficult to maintain a balance of rights.
It follows that the organizational structure belongs to: ()
A. Functional organization
B. Project-based organization
C. Matrix-type organization
D. Agile organization
Reference answer: C
27. The description of typical costs and personnel input levels over the course of a project life cycle is incorrect: ()
A. In the initial phase of the project, the level of cost and personnel input is low
B. In the initial phase of the project, the risk of accomplishing the project objectives is the lowest
C. As the project progresses, the certainty of completing the project usually increases
D. The cost of changes and defect modifications usually increases as the project progresses
Reference answer: B
28. Regarding the description of the interaction of the project management process groups, it is incorrect: ( )
A. Project process groups are rarely discrete or appear only once
B. The interaction of the project process group will only be limited to a certain stage
C. Project process groups overlap each other
D. The project process group is different from the project phase, and the two are related
Reference answer: B
Parsing: When a project is divided into phases, the interaction of the project process group also spans these phases, so that the end of one phase also provides input to start the next phase.
29. ( ) Not subject to the content of the project feasibility study.
A. Investment necessity assessment
B. Financial feasibility analysis
C. Assessment of project risk factors
D. Project authenticity evaluation
Reference answer: D
30. Regarding the description of contract negotiations, it is incorrect that: ( )
A. The method of contract negotiation is generally to talk about commercial terms first, and then technical terms
B. The main contents of technical negotiations include the content of the technical annexes of the contract and the proportion of personnel invested in development
C. The main contents of business negotiation include quality, construction period, service breach penalty, etc
D. Contract negotiation should pursue the greatest interests and pay attention to balance and make it acceptable to both parties
Reference answer: A
31. () Role not part of the Project Charter ()
Prevent demand and scope from creeping in
B stipulates the powers of the project manager
C sets out the overall objectives of the project
D Formally confirm the existence of the project
Reference answer: A
32. () Inputs that are not part of the development of a project management plan.
A. Test and evaluation documents
B. Cost Management Plan
C. Organizational process assets
D. Range benchmark
Reference answer: A
33. () Inputs that are not part of monitoring project work.
A. Project management plan
B. Confirmed Changes
C. Cost forecasting
D. Job performance report
Reference answer: D
Parse:
34. (34) Tools and techniques that are not part of the implementation of overall change control
A. Meetings
B. Expert judgment
C. Resource calendar
D. Data analysis
Reference answer: C
35. (35) is a statistical analysis method for determining the quantitative relationship between two or more variables that are interdependent
A. File analysis
B. Regression analysis
C. Trend analysis
D. Bias analysis
Reference answer: B
36. The description of the project scope management plan is incorrect: (36)
A. A scope management plan is not necessarily very detailed and can be highly generalized
B. Preparing a project management plan can reduce scope creep
C. Risk coverage management plans can be formal or informal
D. The scope management plan is an integral part of the requirements management plan
Reference answer: D
37. Regarding the description of requirements gathering, it is incorrect: (37)
A. Requirements documents describe how each individual requirement meets the business needs of the project
B. Requirements as benchmarks should be clear, quantifiable, complete and independent of each other
C. A requirements tracking matrix is a table that links each requirement to a business goal
D. Test strategies and test scenarios are also content of requirements tracking
Reference answer: B
Parse:
38. Regarding the description of WBS, it is correct that: (38).
(1) The work subcontracted out does not fall within the scope of WBS
(2) In WBS, a unit of work can only be subordinate to - upper-level units
(3) Each work package and control account of WBS is a one-to-one relationship
(4) All project members can grasp the project scope and understand the whole project through WBS
(5) The scope statement and WBS determine the scope benchmark of the project
(6) The WBS level of any project should not exceed 6 floors
A.(1)(2)(6) B.(3)(4)(5) C.(1)(4)(5) D.(2)(4)(6)
Reference answer: D
39. (39) Work that does not belong to the scope of the project is confirmed
A. Organize the customer to sign the delivery of the project
B. An inspection report shall be issued by a third-party supervision agency
C. Determine the criteria for the formal acceptance of the scope
D. Review change requests for defect remediation
Reference answer: C
40. Project manager Xiao Zhao is in charge of a marketing platform project. At a regular project meeting, testers mentioned that the home page of the latest test version had one page more than the previous version, but did not receive notification of the change. The corresponding product manager believed that the customer's request to add a page did not affect other functions, so he arranged for R&D personnel to deal with it. In Xiao Zhao's next behavior, the ones who did not meet the range control requirements were (40)
A. Ask developers to immediately roll back the code to ensure that system functionality and requirements are defined consistently
B. Require a full check of the number of nonconformities with the requirements definition of the latest version
C. Assess the impact of all changes on scope, schedule, and cost, and prepare to commit changes
D. Re-emphasize within the project team that any changes in scope must be reported to the project manager first
Reference answer: A
41. Among the following project activities, the combination of activities with S-S relationship is ( 41)
(1) Function acceptance
(2) Unit testing
(3) Function development
(4) Demand confirmation
(5) System integration
A.④-③
B、③-②
C、③-⑤
D、(1)-(5)
Reference answer: B
42. The optimistic estimate of the project duration takes 20 days to complete, the most likely to be completed in 23 days, and the worst case is 32 days to complete, then the expected completion time and standard deviation of the project are ( 42 )
A、23.2
B、23.2
C、24.2
D、25.1
Reference answer: C
43. When the project manager Xiao Zhang checked the R&D plans of each group, he found that there were three teams planning to design the system architecture in the same week, and the project team had only one senior architect, Li Gong, and it was impossible to complete the architecture design of three groups in one week. So Xiao Zhang discussed with the team leaders to stagger the system architecture design activities of the three groups for a few days without affecting the progress of the project to ensure that Li Gong could complete all the design work. The progress management technique used here is ().
A. Resource balance
B. Resource smoothing
C. Rush work
D. Quick follow-up
Reference answer: B
44. ( ) cannot be used as input to control the progress process
A. Development work daily
B. Project budget analysis table
C. Human resource demand table
D. Project progress forecast
Reference answer: B
Parse:
45. Regarding the description of the formulation of the cost management plan, the correct is ():
A. Scope benchmark, schedule benchmark and cost benchmark are important information for developing a cost management plan
B. In the process of developing a cost management plan, it may be necessary to decide how to mobilize project resources
C. The cost management plan clarifies the project cost structure, cost estimate, cost budget and cost control
D. Cost management can be formulated through meetings, and participants are limited to project managers, project sponsors, selected project team members and project cost leaders
Reference answer: B
Parse:
46. Regarding the description of cost estimates and cost budgets, it is incorrect that:()
A. Cost budgeting to estimate project costs more accurately, including estimates of individual work packages
B. The results of cost budget allocation do not necessarily meet the interests of all managers
C. Cost estimation and cost budget can be done by the same person
Cost budgeting requires accurately apportioning estimated costs to each component of the WBS
Reference answer: C
Analysis: Cost budgeting can only allocate expenses to each part of the WBS as precisely as possible.
47 The project team is working on a cost budget for a completely new area of the project, and the overall estimate of the project is obtained by analogy in the early stage, and the following is not correct: ()
A. From top to bottom, the total cost is weighted to each work package according to the number of occupied resources
B. Calculate the corresponding emergency reserve and management reserve for each work package based on the cost estimate, and summarize the project budget
C. Determine the budget expenditure time plan of each cost according to the time period of resource input and form the project cost budget plan
D. Invite technical experts and project customers in related fields to participate in the discussion of cost budget
Reference answer: D
Analysis: Inviting project customers to participate in the discussion of cost budget is incorrect
48. The following table shows the cost execution (performance) of a project as of March 20:
Based on current project performance, if the remaining work is still completed at planned efficiency, the completion is estimated (ETC).
A. 20 million yuan
B. 25 million yuan
C, 30 million yuan
D. 41.3636 million yuan
Reference answer: C
49 Regarding the understanding of the project management team, it is not correct that:
A. The responsibility for project management is borne by the entire project team or by the project manager alone
B. The project sponsor is responsible for assisting the project management team, including influencing others
C. When the project members change, the management methods of the project management team can be adjusted accordingly
D. The project management team is independent of the project team and is responsible for managing all activities of the project
Reference answer: D
Analysis: The project management team is part of the project team.
50. Project manager Xiao Li found that he had been working overtime continuously for the past two weeks. Team members complained a lot, and some even some members temporarily called sick leave, resulting in work not being completed as planned. In response to this problem, Xiao Li proposed the following improvement measures, among which the ones that help motivate team members are:
A. Emphasize the company's attendance system and clarify that hospital certificates must be issued for sick leave
B. Apply for bonus incentives for members who insist on working overtime and work efficiently
C. Criticize education separately for employees who often complain
D. Temporarily deploy manpower from other teams to replace the work of members on leave
Reference answer: B
51.Conflicts are inevitable in project management, () helps to reduce the number of conflicts.
A. Formulate stricter quality standards
B. Project members are jointly managed by functional managers and project managers
C. Introduce new project management platforms and tool technologies
D. Clarify team rules and division of rights and responsibilities
Reference answer: D
52. Stakeholders who are not direct participants in the project, but may have potential influence on the implementation of the project, are referred to:
A. Main communication object
B. Key influencers
C. Secondary communication objects
D. Main stakeholders
Reference answer: C
Parse:
The Stakeholder Register provides information about the stakeholders in the project's communication plan, and from the Stakeholder Register, you can know the information about the stakeholders in the project: primary communicators (primary stakeholders), key influencers, and secondary stakeholders (secondary stakeholders).
1) Key Communicators The project manager carefully analyzes the main communication partners, to understand their background, as well as some of their personal (or organizational) characteristics, the information they need includes what is involved in the project, when they need it, and what needs special attention when communicating with them
2) Key influencers of people
Project managers should carefully find out whether there are people or organizations who have special decision-making power in the communication process> whether they can directly affect the outcome of the communication, and if so, understand who they are, their scope of power, their influence, etc.
3) Secondary communication objects
Project managers should also be aware of certain people or organizations that are not key stakeholders and key influencers, and who may not be direct project participants, vendors, or consumers, but who may have potential influence on the implementation of the project.
53.In general, ( ) the concern is always on how to maximize the return on an investment while minimizing risk.
A. Customers
B. Users
C. Project Manager
D. Project team
Reference answer: A
54. In the project contract, ( ) is not an obligation of the contractor.
A. Payment of remuneration
B. Delivery of project products
C. Keep secrets
D. Responsible for the quality of work results
Reference answer: A
55. Regarding the description of contract change management, it is incorrect :()
A. Changes in personnel may lead to changes in contracts
B. Change requests and change assessments can be presented in writing or other forms
C. Contract variation should, in a sense, also include the assignment and rescission of the contract
D. The handling of contract changes shall follow the contract change control process
Reference answer: B
56. With regard to the description of procurement negotiations, it is incorrect that:()
A. The project manager must be the principal negotiator of the contract
B. For complex procurement matters, contract negotiation should be a separate process
C. For simple procurement matters, fixed terms and conditions can be applied
D. The final contract is generally the result of bargaining between the buyer and the seller
Reference answer: A
57. Regarding the description of control procurement, it is incorrect that ( )
A. Ensuring the effective execution of the contract is one of the main objectives of the buyer to control the procurement process
B. In the process of controlling the purchase, financial management work is required, supervision of payments to the buyer
C. The project implementation organization should urge suppliers to provide products and services on time to ensure the project construction period
D. Controlling the procurement process is the process of ensuring that the buyer can perform in accordance with the terms of the contract
Reference answer: D
58. Contains the current baseline plus changes to the baseline, and its configuration items are placed under full configuration management.
A. Development library
B. Controlled libraries
C. Distribution library
D. Product library
Reference answer: B
59. The main tasks of release management and delivery activities, including ( ).
A. Effectively control the distribution and delivery of software products
B. Effectively control the issuance and delivery of documents
C. Determine the correctness of deliverables
D. Properly preserve the parent copy of code and documents during the lifetime of the software product
Reference answer: C
Analysis: Determining the correctness of deliverables belongs to quality control.
60. Among the tools and techniques used in the quality management process, ( ) is used to plan the quality management process.
A. Quality audit
B. Statistical sampling
C. Checklist
D. Quality cost
Reference answer: D
61. What is not a measure of project quality is ( )
A. Market share
B. Punctuality
C. Availability
D. Defect rate
Answer: A
62. ( ) Output that is not part of quality control
A. Confirmed Changes
B. Change Requests
C. Risk Register
D. Quality standards
Answer: D
Parse:
63.For those risks that are unknown but cannot be actively managed, it is necessary to ( )
A. Emergency reserves
B. Managing reserves
C. Qualitative analysis
D. Accurate quantitative analysis
Answer: B
64. ( ) is not a principle of risk identification
A. From coarse to fine, from fine to coarse
C. Exclusion and confirmation are equally important
B. Suspect first, then exclude
D. Expand the risk connotation as much as possible
Answer: D
65. ( ) Tools or techniques that are not part of risk control
A. Risk reassessment
B. Bias and trend analysis
C. SWOT analysis
D. Technical performance measurement
Answer: C
Parse:
66. The security technology commonly used in the application system does not include ( )
A. Physical Confidentiality
B. Minimum authorization principle
C. Anti-exposure
D. Error correction coding method
Answer: D
67. The security and confidentiality levels involved in the operation of the application system are system-level security, ( ), functional safety and ( )
A. Platform-level security Resource access security
B. Resource access security Data domain security
C. Resource Access Security Platform-level security
D. Data Domain Security Resource access security
Answer: B
68. Regarding the description of the application for change, it is incorrect ( )
A. All requests for change must be recorded in writing
B. Update the formally controlled project document and also submit a change request
C. When the project manager receives a change request, he should first submit it to the CCB for impact analysis
D. Each change request must be approved or rejected by the responsible person
Answer: C
69. Regarding the description of project acceptance, it is incorrect ( )
A. The acceptance test work can be jointly carried out by the owner and the contractor
B. Formal acceptance of the project includes acceptance of the project products, documentation, and deliverables that have been completed
C. The final acceptance of the project marks the official end of all work and activities of the information system project
D. After the information system passes the acceptance test link, the trial operation of the system can begin
Answer: C
Analysis: The acceptance test work can be jointly carried out by the owner and the contractor, or by a third-party company. Formal acceptance of a project includes acceptance of project products, documentation, and completed deliverables. After the information system passes the acceptance test, the system can be opened for trial operation.
70.Project managers can refer to ( ) to tailor, control, and improve the project's software process.
A.GB/T 16680 "System and software engineering - Requirements for managers of user documentation"
B.GB/T 8566 "System and software engineering: Software life cycle process"
C.GB/T 25000.1 Software Engineering Software Product Quality Requirements and Evaluation Guide
D.GB/T 29834.1 "System and software maintenance - Part 1 Reference index system"
Answer: B
71.New imformation technology includes( )
A.Date Englineering
B.Information Security
C.Metaverse
D.Artifical Intelligence
Answer: D
Analysis: New information technologies include ()
A. Daily engineering
B. Information Security
C. Former Universe
D. Artificial intelligence
72.( )are the major issue that mobile Internet needs to face and deal with
A.storage and computing
B.Communicutions and transmission
C.Date security andprivacy protection
D.intelligent application and interface interaction
Answer: C
Analysis: () is the main problem that the mobile Internet needs to face and deal with.
A. Storage and Computing
B. Communication and Transmission
C. Data Security and Privacy Protection
D. Intelligent application and interface interaction
73.( )is the input of project quality managment.
A.project management plan
B.Data Analysis
C.Risk register
D.Test report
Answer: A
Resolution: () is the input to project quality management.
A. Project management plan
B. Data analysis
C. Risk Registration
D. Test report
74.The project manager can arrange the project schedulemanagement activities in the following order( )
①Plan schedule Management
②Define Activities
③Estimate Activity Durations
④Sequence Activities
⑤Control Schedule
⑥Develop Schedule
A.①②③④⑤⑥
B.②④③⑥⑤①
C.①③④②⑥⑤
D.(1)(2)(4)(3)(6)(5)
Answer: D
Project managers can schedule project schedule activities in the following order ()
Analysis: (1) Plan progress management (2) Define activities (3) Evaluate activity duration (4) Sequence activities (5) Control progress (6) Make schedules
75.The information security attribute and objectives are( )
A.Confidentiality , Integrity, and Availability
B.Confidentiality , Non-repudiation and shareability
C.Confidentiality , Stability and Availability
D.Confidentiality , Non-repudiation and Availability
Answer: A
Resolution: Attributes and goals of information security ()
A. Confidentiality, Integrity and Availability
B. Confidentiality, Non-Repudiation and Shareability
C. Confidentiality, Stability and Availability
D. Confidentiality, Non-Repudiation and Availability