● In order to complete work on your projects, you have been provided confidential information from all of your clients. A university contacts you to help it in its research. Such assistance would require you to provide the university with some of the client data from your files. What should you do? __(71)__
(71)A.Release the information, but remove all references to the clients1 names
B.Provide high-level information only
C.Contact your clients and seek permission to disclose the information
D.Disclose the information
● TCP/IP is a communication protocol, which provides many different networking services. The
TCP/IP Internet protocol suite is formed from two standards: the TCP (Transmission Control Protocol) and the IP(Internet Protocol). __(72)__ means it is on the transport layer.
(72)A.ISO
B.IP
C.OSI
D.TCP
● Earned value analysis is an example of __(73)__.
(73)A.performance reporting
B.planning control
C.Ishikawa diagrams
D.Integrating the project components into a whole
● Quality control is normally performed by the __(74)__.
(74)A.QA personnel
B.project team
C.operating personnel
D.project manager
● Workarounds are determined during which risk management process? __(75)__.
(75)A.Risk identification
B.Quantitative risk analysis
C. Plan risk responses
D.Risk monitoring and control
各省软考办 | ||||||||||