Professional Documents
Culture Documents
In the context of earned value management (EVM), three key metrics are used:
These three metrics can be used to calculate key performance indicators (KPIs) in
earned value management, such as:
These earned value metrics and KPIs help project managers assess project
performance, identify potential issues, make informed decisions, and take corrective
actions to keep the project on track.
Q 2. What is extreme programming?
Identify Similar Projects: The first step is to identify past projects that are
similar in nature, scope, complexity, or other relevant factors to the current
project. These projects should have historical data available for reference.
Define Key Parameters: Determine the parameters that are relevant to the
estimation, such as project duration, effort, cost, or other specific metrics.
These parameters should be consistent and measurable across both the past
projects and the current project.
Gather Historical Data: Collect data from the past projects, such as project
plans, records, and documentation. This data should include information on
the parameters being estimated, such as actual durations, effort expended, or
costs incurred.
Compare and Analyze: Analyze the historical data and compare it with the
current project to identify similarities, differences, and patterns. Look for key
factors or variables that influenced the parameters being estimated in the
past projects.
Apply Analogy: Based on the identified similarities and patterns, make
adjustments or apply scaling factors to the historical data to account for any
differences between the past projects and the current project. These
adjustments help tailor the estimates to the specific characteristics of the
current project.
Estimate and Validate: Use the adjusted historical data as a basis to estimate
the parameters for the current project. Validate the estimates against other
estimation techniques or expert judgment to ensure reasonableness and
accuracy.
Q5 . What is project control cycle?
The project control cycle, also known as the project control process, refers to the
ongoing and iterative process of monitoring, measuring, and adjusting project
performance to ensure that project objectives are achieved. It involves a series of
steps aimed at maintaining control and making necessary adjustments throughout
the project lifecycle.
The project control cycle typically consists of the following key steps:
b. Bottom-Up Approach: Begin with individual tasks and aggregate them into larger
deliverables. This method is beneficial when there is a detailed understanding of the
tasks involved but less clarity on the overall project structure.
c. Mind Mapping: Use visual diagrams, such as mind maps, to brainstorm and
capture project components. This approach allows for easy exploration of different
levels and relationships between elements.
d. Analogous Estimating: Draw on historical data from similar projects to help
identify work components and estimate their effort. This method leverages past
experience and provides a starting point for defining the WBS.
e. Expert Judgment: Seek input and insights from experienced project managers or
industry experts to ensure that the WBS is comprehensive, accurate, and aligned with
best practices.
Remember that the WBS should be flexible and can be refined as the project
progresses. It serves as a foundation for various project management activities such
as estimating, scheduling, resource allocation, and monitoring progress. Regularly
review and update the WBS to reflect changes and evolving project requirements.
Scope creep refers to the unauthorized expansion of project scope without proper
evaluation or approval. It occurs when changes or additions to the project scope are
introduced gradually and accumulate over time. Scope creep is often caused by poor
scope management practices, changing requirements, unrealistic expectations, and
a lack of proper documentation and communication. It can result in schedule delays,
increased costs, decreased quality, and stakeholder dissatisfaction. To mitigate
scope creep, a robust scope management process should be established, including
clear scope definition, stakeholder analysis, change control processes, and effective
communication channels.
Q7.Explain with help of example how pert techniques can be applied to evaluate
risks to schedule?
Pert techniques, specifically the Program Evaluation and Review Technique (PERT),
can be applied to manage and mitigate risks associated with project scheduling.
PERT helps in estimating and analyzing the impact of uncertainties on the project
timeline. Let's consider an example to understand how PERT techniques can be used
to avoid schedule risks:
Imagine a construction project to build a new office building. The project consists of
various activities such as site preparation, foundation construction, structural work,
interior finishes, and final inspections. Each activity has an estimated duration, but
there are inherent risks that could potentially impact the schedule.
Identify Risks: Identify potential risks that could impact the project schedule.
Estimate Activity Duration: Use PERT to estimate activity durations by
considering optimistic (O), most likely (M), and pessimistic (P) scenarios.
Calculate Expected Duration: Calculate the expected duration for each activity
using the formula (O + 4M + P) / 6.
Identify Critical Path: Determine the critical path, which is the sequence of
activities with the longest total duration.
Analyze Schedule Risks: Perform schedule risk analysis by assigning
probabilities to durations and simulating the impact of risks on the project
schedule.
Risk Mitigation: Develop strategies to mitigate identified risks, such as
contingency planning and adjusting the schedule.
Monitor and Control: Continuously monitor the project's progress, track critical
path activities, and implement mitigation measures as needed.
Q. what is resource histogram?
Several methods are commonly adopted to assess and visualize the progress of a
project. Here are some of the commonly used methods:
To leverage the insights from a project closure analysis report for future projects, the
following steps can be taken:
In software project management, risk refers to any uncertain event or condition that,
if it occurs, could have a positive or negative impact on the project's objectives. Risks
are potential problems that may hinder the successful completion of a software
Technical Risks: These risks are associated with the technical aspects of the
software development process. They may include issues related to software
architecture, design, coding, integration, performance, and scalability.
Schedule Risks: These risks pertain to the project's timeline and schedule.
They involve the possibility of delays in completing tasks, dependencies,
resource availability, and unforeseen events that may impact the project's
progress.
Cost Risks: These risks involve the project's budget and financial aspects.
They include potential cost overruns, inaccurate cost estimation, resource
allocation problems, and unexpected expenses.
Scope Risks: Scope risks relate to the project's requirements and scope
definition. They involve the possibility of changes in requirements, scope
creep, inadequate scope management, and poor communication between
stakeholders.
Organizational Risks: These risks are associated with the organizational
structure and culture. They may include issues such as lack of management
support, inadequate resources, ineffective communication, and conflicting
priorities.
Legal and Compliance Risks: These risks pertain to legal and regulatory
requirements that must be met during the software development process.
Non-compliance with laws and regulations can lead to legal disputes,
penalties, and project delays.
External Risks: These risks arise from factors external to the project but can
still impact its success. They include risks associated with vendors, suppliers,
market conditions, technological changes, and natural disasters.
identifying and addressing potential risks early in the project, managers can take
proactive measures to minimize their impact and increase the chances of project
success.
Similar to a Work Breakdown Structure (WBS), which breaks down project work into
smaller tasks, the RBS breaks down project risks into smaller subcategories. It
provides a structured framework for organizing and managing risks throughout the
project lifecycle.
Q. risk management?
A risk management technique is usually seen in the software Project plan. This can
be divided into Risk Mitigation, Monitoring, and Management Plan (RMMM). In this
plan, all works are done as part of risk analysis. As part of the overall project plan
project manager generally uses this RMMM plan. In some software teams, risk is
documented with the help of a Risk Information Sheet (RIS). This RIS is controlled by
using a database system for easier management of information i.e creation, priority
ordering, searching, and other analysis. After documentation of RMMM and start of a
project, risk mitigation and monitoring steps will start. Risk Mitigation: It is an activity
used to avoid problems (Risk Avoidance). Steps for mitigating the risks as follows.
1. Finding out the risk.
2. Removing causes that are the reason for risk creation.
3. Controlling the corresponding documents from time to time. 4. Conducting timely
reviews to speed up the work
. Risk Monitoring: It is an activity used for project tracking. It has the following
primary objectives as follows.
1. To check if predicted risks occur or not.
2. To ensure proper application of risk aversion steps defined for risk.
3. To collect data for future risk analysis.
4. To allocate what problems are caused by which risks throughout the project.
Risk Management and planning : It assumes that the mitigation activity failed and
the risk is a reality. This task is done by Project manager when risk becomes reality
and causes severe problems. If the project manager effectively uses project
mitigation to remove risks successfully then it is easier to manage the risks. This
shows that the response that will be taken for each risk by a manager. The main
objective of the risk management plan is the risk register. This risk register describes
and focuses on the predicted threats to a software project.
Forward Pass: The forward pass is a technique used to determine the earliest
possible start (ES) and finish (EF) dates for each activity in a project schedule.
It involves calculating the timing of activities starting from the project's
beginning and moving forward through the network diagram. By considering
the estimated duration of each activity and any dependencies, the forward
pass establishes the earliest point in time when an activity can start and finish
assuming no delays or constraints. This helps determine the project's overall
duration and identify the critical path—the sequence of activities that
collectively determine the project's minimum timeframe.
Backward Pass: The backward pass is a technique used to determine the
latest possible start (LS) and finish (LF) dates for each activity in a project
schedule. It involves calculating the timing of activities starting from the
project's end and moving backward through the network diagram. By
considering any constraints or dependencies on succeeding activities, the
backward pass determines the latest point in time when an activity can start
and finish without delaying the overall project. This helps identify the flexibility
or float available for each activity, indicating the amount of time an activity
can be delayed without impacting the project's overall duration or the critical
path.
The ISO/IEC 9126 (and ISO/IEC 25010) standard defines six main quality
characteristics that software should possess: