Search Header Logo

First Quiz - CS326A

Authored by Raniah Taurac

Computers

University

Used 2+ times

First Quiz - CS326A
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Your team is developing an e-commerce website. Midway, a key stakeholder demands additional features beyond the agreed scope.

What should you do first?

Immediately approve the request to satisfy the client

Reject the request outright to avoid delays

Assess the impact on timeline, budget, and resources before deciding

Ignore the request and continue as planned

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A software project is delayed because developers underestimated the time needed for database integration.

What type of risk is this?

Technical Risk

Schedule Risk

Cost Risk

External Risk

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Your project has multiple interdependent tasks. A delay in one task affects all others.

Which project scheduling tool is best to visualize dependencies?

Work Breakdown Structure

Gantt Chart

SWOT Analysis

Fishborne Diagram

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Your project requires outsourcing a payment gateway service. The provider charges extra for customization.

What risk strategy should be used?

Risk Avoidance

Risk Acceptance

Risk Reduction

Risk Transfer

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A competitor releases a similar product before your scheduled launch.

Which type of risk does this represent?

Technical Risk

External Risk

Schedule Risk

Cost Risk

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A junior developer is assigned to lead a critical project component.

What risk does this pose?

Cost Risk

External Risk

Technical Risk

Schedule Risk

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Your company is launching a new mobile banking app. To ensure its security, the team decides to hire cybersecurity consultants.

Which risk mitigation strategy is applied?

Risk Avoidance

Risk Reduction

Risk Transfer

Risk Acceptance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers