SlideShare a Scribd company logo
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
ASSIGNMENT
DRIVE SPRING 2016
PROGRAM MBA
SEMESTER IV
SUBJECT CODE & NAME PM 0016 –PROJECT RISK MANAGEMENT
BK ID B2012
Credit & Marks 4 CREDITS AND 60 MARKS
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Question. 1. What is Project Risk? Explain different sources of
project risk with examples
Answer:ProjectRiskManagementincludesthe processes of conducting risk management planning,
identification,analysis,responseplanning,andcontrollingriskonaproject.The objectivesof project
risk management are to increase the likelihood and impact of positive events, and decrease the
likelihood and impact of negative events in the project.
Project Risk identification is the most important process in the Risk Management Planning. Risk
Identificationdetermines which risks might affect the project and documents their characteristics.
However,we shouldnotspendtoomuchtime inidentifying risks. After the list is made, qualitative
and quantitative analysis is done to figure out which risks you spend time and/or money on.
Question. 2. What is Risk Opportunity and Management System
(ROMS)? What are its benefits?
Answer:ROMS is based on 20 years of research and current best practice across a range of high risk
industry sectors including construction, mining, security, nuclear power, defence, social and
economic infrastructure, ports, health, emergency management, asset management etc
ROMS has been used as the basis for risk and
Question. 3. 1. Using Internet, identify a project and list down all
the activities and milestonesof a project and the activity risks
associated with these milestones.
Answer:The purpose of this process is to identify the specific tasks needed to be done in order to
produce the project's deliverables. This needs to be done in sufficient detail to estimate what
resources and time will be required to complete them. The main inputs are the scope baseline
consisting of the approved project scope statement, the work breakdown structure, and the WBS
dictionary.
2. Using Internet, identify a project and the activity risks associated
with it.Categorise the risks into three groups: controllable known,
uncontrollableknown and unknown. Find out the percentage of
“unknowns” in total risks atthe beginning and towards the end of
the project.
Answer:The work package is the lowest level of the WBS is achieved when the work can be
accuratelyestimated(bothcostandduration) andcan be managed by one individual. The key word
here is 'managed', although the work package can be managed by one person, the actual work
within the work package may be completed by several people.
For example, One individual could manage
Question. 4. What are the sources of resource risks?
Answer: Resource risksrepresentlessthanone-thirdof the recordsinthe PERIL database. There are
three categories of resource risk: people, outsourcing, and money. People risks arise within the
projectteam.Outsourcingrisks are due to the use of people and services outside the project team
to performcritical projectwork.The thirdcategory,money,is something of an anomaly in the data,
as veryfewof the problemsreportedwere primarilyaboutfunding.Moneyis,however, a key factor
in many of the people and outsourcing problems, and
Question. 5. What are different types of scope risks?
Answer: While scope risksrepresentedroughlyone-third of the data in the Project Experience Risk
Information Library (PERIL) database, they account for close to half of the total impact. The two
broad categories of scope risk in PERIL relate to
Question. 6. Explain the three point estimates used in quantitative
risk analysis.
Answer:The three-point estimation technique is used in management and information systems
applications for the construction of an approximate probability distribution representing the
outcome of future events, based on very limited information. While the distribution used for the
approximation might be a normal distribution, this is not always so and, for example a triangular
distribution might be used, depending on the
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601

More Related Content

What's hot

Risk identification & assessment techniques
Risk identification & assessment techniquesRisk identification & assessment techniques
Risk identification & assessment techniques
Sachin Melwani
 
Risk identification
Risk identificationRisk identification
Risk identification
sapna moodautia
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
Amandeep Midha
 
Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
EMAC Consulting Group
 
Risk Assessment And Risk Treatment
Risk Assessment And Risk TreatmentRisk Assessment And Risk Treatment
Risk Assessment And Risk Treatment
Ben Omoakin Oguntala, developingafrica(dot)net
 
Project risk management focus on risk identification techniques
Project risk management   focus on risk identification techniquesProject risk management   focus on risk identification techniques
Project risk management focus on risk identification techniques
Marco De Santis, PMP, CFPP
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
Osama Salah
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
BECM, RUET, Bangladesh
 
Applying risk radar (v2)
Applying risk radar (v2)Applying risk radar (v2)
Applying risk radar (v2)
Glen Alleman
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
"Apolonio \"Apps\"" Garcia
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
RapidSSLOnline.com
 
Risk Analysis Webinar
Risk Analysis WebinarRisk Analysis Webinar
Risk Analysis Webinar
Jody Keyser
 
Risk management 4th in a series
Risk management 4th in a seriesRisk management 4th in a series
Risk management 4th in a series
Glen Alleman
 
Risk Management
Risk ManagementRisk Management
Risk Management
saranshshah
 
Information Security Risk Quantification
Information Security Risk QuantificationInformation Security Risk Quantification
Information Security Risk Quantification
Joel Baese
 
Probabilistic Cost, Schedule, and Risk management
Probabilistic Cost, Schedule, and Risk managementProbabilistic Cost, Schedule, and Risk management
Probabilistic Cost, Schedule, and Risk management
Glen Alleman
 
Risk Management
Risk ManagementRisk Management
Risk Management
Kathleen Abubo
 
Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom
92pawansingh
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
Symantec
 
Construction project risk management
Construction project risk managementConstruction project risk management
Construction project risk management
IQPC
 

What's hot (20)

Risk identification & assessment techniques
Risk identification & assessment techniquesRisk identification & assessment techniques
Risk identification & assessment techniques
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
Project risk management notes bagamoyo 12.10.2017 final v1
Project risk management  notes bagamoyo 12.10.2017 final v1Project risk management  notes bagamoyo 12.10.2017 final v1
Project risk management notes bagamoyo 12.10.2017 final v1
 
Risk Assessment And Risk Treatment
Risk Assessment And Risk TreatmentRisk Assessment And Risk Treatment
Risk Assessment And Risk Treatment
 
Project risk management focus on risk identification techniques
Project risk management   focus on risk identification techniquesProject risk management   focus on risk identification techniques
Project risk management focus on risk identification techniques
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 
Applying risk radar (v2)
Applying risk radar (v2)Applying risk radar (v2)
Applying risk radar (v2)
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
Risk Analysis Webinar
Risk Analysis WebinarRisk Analysis Webinar
Risk Analysis Webinar
 
Risk management 4th in a series
Risk management 4th in a seriesRisk management 4th in a series
Risk management 4th in a series
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Information Security Risk Quantification
Information Security Risk QuantificationInformation Security Risk Quantification
Information Security Risk Quantification
 
Probabilistic Cost, Schedule, and Risk management
Probabilistic Cost, Schedule, and Risk managementProbabilistic Cost, Schedule, and Risk management
Probabilistic Cost, Schedule, and Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Construction project risk management
Construction project risk managementConstruction project risk management
Construction project risk management
 

Similar to Pm 0016 project risk management

Pm 0016 –project risk management
Pm 0016 –project risk managementPm 0016 –project risk management
Pm 0016 –project risk management
smumbahelp
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
consult4solutions
 
Pm0016 –project risk management
Pm0016 –project risk managementPm0016 –project risk management
Pm0016 –project risk management
smumbahelp
 
Repeatable Risk Identification - Paper
Repeatable Risk Identification - PaperRepeatable Risk Identification - Paper
Repeatable Risk Identification - Paper
Daniel Ackermann
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
Mohamed Salah Eldien Mohamed Ali
 
presentation project risk management description
presentation project risk management descriptionpresentation project risk management description
presentation project risk management description
mambojumb
 
978285452340_11.pptx
978285452340_11.pptx978285452340_11.pptx
978285452340_11.pptx
sahilgupta499
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
KamranKhan353531
 
Lecture 09 - 17th April 2021.pptx
Lecture 09 - 17th April 2021.pptxLecture 09 - 17th April 2021.pptx
Lecture 09 - 17th April 2021.pptx
FaizanGul6
 
Pm0016 summer-2016
Pm0016 summer-2016Pm0016 summer-2016
Pm0016 summer-2016
smumbahelp
 
ITPM_11.ppt
ITPM_11.pptITPM_11.ppt
ITPM_11.ppt
AhmedHusseinElmi
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
NmnKmr2
 
How Traditional Risk Reporting Has Let Us Down
How Traditional Risk Reporting Has Let Us DownHow Traditional Risk Reporting Has Let Us Down
How Traditional Risk Reporting Has Let Us Down
Acumen
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in Oman
EECJOURNAL
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
felicidaddinwoodie
 
A Process Based Approach To Business Risk Analysis The Royal Navy Experience
A Process Based Approach To Business Risk Analysis  The Royal Navy ExperienceA Process Based Approach To Business Risk Analysis  The Royal Navy Experience
A Process Based Approach To Business Risk Analysis The Royal Navy Experience
Scott Faria
 
IRJET- Projects in Constructions due to Inadequate Risk Management
IRJET-  	  Projects in Constructions due to Inadequate Risk ManagementIRJET-  	  Projects in Constructions due to Inadequate Risk Management
IRJET- Projects in Constructions due to Inadequate Risk Management
IRJET Journal
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
IRJET Journal
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
SAJJAD KHUDHUR ABBAS
 
IRJET- Risk Management in Residential Project by Primavera Software
IRJET- Risk Management in Residential Project by Primavera SoftwareIRJET- Risk Management in Residential Project by Primavera Software
IRJET- Risk Management in Residential Project by Primavera Software
IRJET Journal
 

Similar to Pm 0016 project risk management (20)

Pm 0016 –project risk management
Pm 0016 –project risk managementPm 0016 –project risk management
Pm 0016 –project risk management
 
Pm0016 project risk management
Pm0016 project risk managementPm0016 project risk management
Pm0016 project risk management
 
Pm0016 –project risk management
Pm0016 –project risk managementPm0016 –project risk management
Pm0016 –project risk management
 
Repeatable Risk Identification - Paper
Repeatable Risk Identification - PaperRepeatable Risk Identification - Paper
Repeatable Risk Identification - Paper
 
8. project risk management
8. project risk management8. project risk management
8. project risk management
 
presentation project risk management description
presentation project risk management descriptionpresentation project risk management description
presentation project risk management description
 
978285452340_11.pptx
978285452340_11.pptx978285452340_11.pptx
978285452340_11.pptx
 
11. Project Risk Management.pptx
11. Project Risk Management.pptx11. Project Risk Management.pptx
11. Project Risk Management.pptx
 
Lecture 09 - 17th April 2021.pptx
Lecture 09 - 17th April 2021.pptxLecture 09 - 17th April 2021.pptx
Lecture 09 - 17th April 2021.pptx
 
Pm0016 summer-2016
Pm0016 summer-2016Pm0016 summer-2016
Pm0016 summer-2016
 
ITPM_11.ppt
ITPM_11.pptITPM_11.ppt
ITPM_11.ppt
 
Control only.pdf
Control only.pdfControl only.pdf
Control only.pdf
 
How Traditional Risk Reporting Has Let Us Down
How Traditional Risk Reporting Has Let Us DownHow Traditional Risk Reporting Has Let Us Down
How Traditional Risk Reporting Has Let Us Down
 
Software Project Risk Management Practice in Oman
Software Project Risk Management Practice in OmanSoftware Project Risk Management Practice in Oman
Software Project Risk Management Practice in Oman
 
1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx1Risk ReportingRisk ReportingRique Gidde.docx
1Risk ReportingRisk ReportingRique Gidde.docx
 
A Process Based Approach To Business Risk Analysis The Royal Navy Experience
A Process Based Approach To Business Risk Analysis  The Royal Navy ExperienceA Process Based Approach To Business Risk Analysis  The Royal Navy Experience
A Process Based Approach To Business Risk Analysis The Royal Navy Experience
 
IRJET- Projects in Constructions due to Inadequate Risk Management
IRJET-  	  Projects in Constructions due to Inadequate Risk ManagementIRJET-  	  Projects in Constructions due to Inadequate Risk Management
IRJET- Projects in Constructions due to Inadequate Risk Management
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 
Episode 25 : Project Risk Management
Episode 25 :  Project Risk ManagementEpisode 25 :  Project Risk Management
Episode 25 : Project Risk Management
 
IRJET- Risk Management in Residential Project by Primavera Software
IRJET- Risk Management in Residential Project by Primavera SoftwareIRJET- Risk Management in Residential Project by Primavera Software
IRJET- Risk Management in Residential Project by Primavera Software
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 

Pm 0016 project risk management

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601 ASSIGNMENT DRIVE SPRING 2016 PROGRAM MBA SEMESTER IV SUBJECT CODE & NAME PM 0016 –PROJECT RISK MANAGEMENT BK ID B2012 Credit & Marks 4 CREDITS AND 60 MARKS Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Question. 1. What is Project Risk? Explain different sources of project risk with examples Answer:ProjectRiskManagementincludesthe processes of conducting risk management planning, identification,analysis,responseplanning,andcontrollingriskonaproject.The objectivesof project risk management are to increase the likelihood and impact of positive events, and decrease the likelihood and impact of negative events in the project. Project Risk identification is the most important process in the Risk Management Planning. Risk Identificationdetermines which risks might affect the project and documents their characteristics. However,we shouldnotspendtoomuchtime inidentifying risks. After the list is made, qualitative and quantitative analysis is done to figure out which risks you spend time and/or money on. Question. 2. What is Risk Opportunity and Management System (ROMS)? What are its benefits? Answer:ROMS is based on 20 years of research and current best practice across a range of high risk industry sectors including construction, mining, security, nuclear power, defence, social and economic infrastructure, ports, health, emergency management, asset management etc ROMS has been used as the basis for risk and
  • 2. Question. 3. 1. Using Internet, identify a project and list down all the activities and milestonesof a project and the activity risks associated with these milestones. Answer:The purpose of this process is to identify the specific tasks needed to be done in order to produce the project's deliverables. This needs to be done in sufficient detail to estimate what resources and time will be required to complete them. The main inputs are the scope baseline consisting of the approved project scope statement, the work breakdown structure, and the WBS dictionary. 2. Using Internet, identify a project and the activity risks associated with it.Categorise the risks into three groups: controllable known, uncontrollableknown and unknown. Find out the percentage of “unknowns” in total risks atthe beginning and towards the end of the project. Answer:The work package is the lowest level of the WBS is achieved when the work can be accuratelyestimated(bothcostandduration) andcan be managed by one individual. The key word here is 'managed', although the work package can be managed by one person, the actual work within the work package may be completed by several people. For example, One individual could manage Question. 4. What are the sources of resource risks? Answer: Resource risksrepresentlessthanone-thirdof the recordsinthe PERIL database. There are three categories of resource risk: people, outsourcing, and money. People risks arise within the projectteam.Outsourcingrisks are due to the use of people and services outside the project team to performcritical projectwork.The thirdcategory,money,is something of an anomaly in the data, as veryfewof the problemsreportedwere primarilyaboutfunding.Moneyis,however, a key factor in many of the people and outsourcing problems, and Question. 5. What are different types of scope risks?
  • 3. Answer: While scope risksrepresentedroughlyone-third of the data in the Project Experience Risk Information Library (PERIL) database, they account for close to half of the total impact. The two broad categories of scope risk in PERIL relate to Question. 6. Explain the three point estimates used in quantitative risk analysis. Answer:The three-point estimation technique is used in management and information systems applications for the construction of an approximate probability distribution representing the outcome of future events, based on very limited information. While the distribution used for the approximation might be a normal distribution, this is not always so and, for example a triangular distribution might be used, depending on the Dear students get fully solved assignments Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601