Planning a project by listing all of the individual tasks and then collecting them into logical groupings is called the ____ method of creating a WBS.

A. bottom-up
B. top-down
C. list-based
D. visionary


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the data type of the reference emp1.name[0]?

a. float b. int c. char d. emprec e. double

Computer Science & Information Technology

A navigation form is useful when you want to provide a(n) ________ of options: navigation tabs and sub-navigation options

Fill in the blank(s) with correct word

Computer Science & Information Technology

What process periodically validates a user's account, access control, and membership role or inclusion in a specific group?

A. recertification B. revalidation C. control audit D. group auditing

Computer Science & Information Technology

The ____________________ fraud is a social engineering attack that involves convincing the victim to participate in a seeming money-making venture while getting the victim to pay fees or bribes or to refund uncleared international payments.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology