Chapter 11 Essay

9126 Words37 Pages
Project Management, 2e (Pinto)
Chapter 11 Critical Chain Project Scheduling

11.1 True/False

1) Once the organization elevates its constraint, its system has no constraint.
Answer: FALSE
Diff: 2
Section: 11.1 The Theory of Constraints and Critical Chain Project Scheduling
Skill: Definition
AACSB Tag: Reflective

2) An organization's budget estimating process routinely misses the actual cost of a project by 25%. For the most recent project, the budget variance was a ridiculous 23%, but this must be considered common cause variance.
Answer: TRUE
Diff: 2
Section: 11.1 The Theory of Constraints and Critical Chain Project Scheduling
Skill: Factual
AACSB Tag: Reflective

3) In order to estimate completion of a Gaussian distributed
…show more content…
Answer: Central Limit
Diff: 2
Section: 11.4 The Critical Chain Solution to Project Scheduling
Skill: Definition
AACSB Tag: Reflective

7) Critical Chain Project Methodology __________ risk for the entire project.
Answer: aggregates
Diff: 2
Section: 11.4 The Critical Chain Solution to Project Scheduling
Skill: Definition
AACSB Tag: Reflective

8) In classic project management, activity durations are estimated based on a(n) __________% likelihood of successful completion, but in CCPM, activity estimates are at the __________% level.
Answer: 90, 50
Diff: 2
Section: 11.4 The Critical Chain Solution to Project Scheduling
Skill: Definition
AACSB Tag: Reflective

9) CCPM advocates putting off non-critical activities as late as possible and providing each activity with a(n) __________.
Answer: feeder buffer
Diff: 2
Section: 11.4 The Critical Chain Solution to Project Scheduling
Skill: Definition
AACSB Tag: Reflective

10) A(n) __________ refers to a safety margin separating different projects scheduled to use the same resource.
Answer: capacity constraint buffer
Diff: 2
Section: 11.6 Critical Chain Project Portfolio Management
Skill: Definition
AACSB Tag: Reflective
11.3 Multiple Choice

1) The first step in TOC methodology is to:
A) identify the constraint.
B) exploit the constraint.
C) subordinate the system to the

More about Chapter 11 Essay

Get Access