A variety of tools is available to help the analyst to discover the users'true needs.These tools are grouped into three broad techniques that are based on the degree of change anticipated in the to-be system-Business process( )is used when the basic business Requirements outlined in the system request focus on employing computer technology in some aspect of the business process.Two popular activities used in the technique are( ).Business process( )means that the basic business requirements target moderate changes to the organization's operations.( )are three popular activities in the technique.Business process( )means changing the current way of doing business and making major changes to take advantage of new ideas and new technology.
问题1选项
A.automation
B.modeling
C.improvement
D.reengineering
问题2选项
A.duration analysis and outcome analysis
B.problem analysis and root cause analysis
C.technology analysis and activity elimination
D.activity-based costing and informal benchmarking
问题3选项
A.automation
B.modeling
C.improvement
D.reengineering
问题4选项
A.Duration analysis,activity-based costing and informal benchmarking
B.Outcome analysis,technology analysis and activity elimination
C.Problem analysis,root cause analysis and critical path analysis
D.Cost-benefit analysis,schedule analysis and risk analysis
问题5选项
A.automation
B.modeling
C.improvement
D.reengineering
正确答案及解析
正确答案
解析
包含此试题的试卷
你可能感兴趣的试题
( )is that it provides guidance and direction on how quality will be managed and verified throughout the project.
-
- A.Plan Quality Management
- B.Manage Quality
- C.Control Quality
- D.Project Charter
- 查看答案
( )the process of determining,documenting,and managing stakeholder needs and requirements to meet Project objectives.
-
- A.Plan Scope Management
- B.Collection Requirements
- C.Validate Scope
- D.Control Scope
- 查看答案
The information security management system preserves the confidentiality,integrity and availability of information by applying a( ).
-
- A.technology management process
- B.resource management process
- C.quality management process
- D.risk management process
- 查看答案
( )is a decentralized database,ensure that the data will not be tampered with and forged.
-
- A.Artificial intelligence
- B.Blockchain
- C.Sensing technology
- D.Big datA
- 查看答案
( )puts computer resources on the web,and must meet the requirements of super capacity,super concurrency,super speed and super security.
-
- A.Cloud computing
- B.Big datA
- C.Blockchain
- D.Internet of things
- 查看答案