Describe the process of building a risk table.

What will be an ideal response?


Project teams begin by listing all risks. Each risk is categorized by type and its probability is estimated. The impact value of each risk is assessed. Risk probability and impact are used to sort the table. Risks are then classified as high impact or low impact by defining a "cutoff" line. High impact risks (those above the line) receive management attention.

Computer Science & Information Technology

You might also like to view...

What appears to be a legitimate program but is actually malicious?

a. Trojan horse b. Virus hoax c. Windows Defender

Computer Science & Information Technology

The default period of time for AutoRecover is ________ minutes

Fill in the blank(s) with correct word

Computer Science & Information Technology

An anonymous enumerated type is an enumerated type declared without a name.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What do we call the things that are discharged from a system?

a. output b. component c. environment d. boundary

Computer Science & Information Technology