Test3 Flashcards

1
Q

What is PAUC

A

Program Acquisition Unit Cost = $ Total Development + $ Procurement + $ Construction / Total Program Quantity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two TYPES of Maintenance

A
  1. Preventative
  2. Repair
    (3 Levels: Org, Intermediate, Depot)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First attainment of the minimum capability to employ a weapon, item, or system.

A

IOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(____) supports the acquisition process by ensuring that logistics considerations are properly planned, integrated, continue after fielding, and disposal of the system at end of useful life

A

Life Cycle Logistics (LCL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 Major Areas of LCL.

A
  1. Acquisition Logistics
  2. Sustainment Logistics
  3. Performance Based Life Cycle Product Support (PBL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A (___) is a term that includes personnel, supplies/equipment, and real property (land and facilities) necessary to deploy and sustain a weapon system.

A

Logistics Footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two goals for RMS (reliability, maintainability, and supportability).

A
  1. Higher Operational Effectiveness

2. Lower Ownership Costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(____) not only concerns the system itself but also the entire infrastructure of activities and resources that sustain overall support, and contribute to overall support cost (fuel, equipment, technical data)

A

Supportability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(_____) incorporates non-proprietary interfaces, protocols, industrial standards, interoperable components, and portability

A

Open Systems Architecture (OSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Measure of Maintainability

A

Mean time to repair (MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ requires the PM to provide PESHE (programmatic environment, safety, and occupational health evaluation)

A

DoD 5000.02

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 ways to analyze and document potential hazards

A
  1. Categorical Exclusion (CATEX)
  2. Environmental Assessment (EA)
  3. Environmental Impact Statement (EIS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For a Weapons System, system and software _______ will be among its predominant critical requirements.

A

safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

for a C4I system, ________ issues will be among its predominant critical requirements.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

for a Defense Business System, _______ issues will be among its predominant critical requirements.

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The mandatory framework defines multiple “views” of an architecture.

A
  1. Operational (OV)
  2. Systems (SV)
  3. Standards (StdV)
  4. All (AV)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the purpose of the ________ ________ _______is to ensure programs protect their technology, components, and information thru the acquisition process during design, development, delivery and sustainment.

A

Program Protection Plan (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The 4 components of Downtime

A
  1. Logistics Delay
  2. Administrative Delay
  3. Corrective Maintenance
  4. Preventative Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Directs PMs to eliminate ESOR risks and manage residual ESOH risks?

A

MIL-STD-882

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The ____ is developed by PM at milestone ____, and updated prior to each milestone.

A

Acquisition Program Baseline / MS B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A critical breach to the APB is greater than ___% of the current baseline estimate and ___% of the original baseline estimate

A

25% / 50% (Significant Breach are +15% and +30%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When a program deviation occurs, the PM must notify the MDA ____ and follow up within ____ days to explain the reason for the problem and corrective steps taken.

A

Immediately / 30 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The PM has the flexibility to work within the____ between threshold and objective parameters.

A

Tradespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Responsibility Assignment Matrix (Ram) shows the intersection of the _____ and _____.

A

WBS (work to be done) and the OBS (who does the work)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

3 steps to develop the performance measurement baseline (PMB).

A
  1. Define the Work (WBS)
  2. Schedule the Work
  3. Allocate Budgets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

____is a formal review conducted jointly between the gov’t and contractor, mandatory for all EVM

A

Integrated Baseline Review (IBR)

27
Q

2 Major Types of EVMS surveillance

A

System Surveillance and Program/Contract Surveillance

28
Q

How many EVMS guidelines

A

32

29
Q

What type of software is used for communications?

A

C4ISR (CMD, control, comms, computers, intel, surveillance and recon)

30
Q

Common Software Development Approaches

A
  1. Waterfall
  2. Incremental
  3. Spiral
  4. Agile
31
Q

The ____ is the current act covering the acquisition of information technology.

A

Clinger-Cohen Act (CCA)

32
Q

____ Provide an organization with a set of processes that, if done by qualified persons using appropriate tools and methods, will provide a capability to do effective and efficient engineering of systems, including their software components

A

Standards

33
Q

Key INFOSEC technologies

A
  1. Firewalls
  2. Encryption
  3. Antivirus Software
34
Q

There are ____Integrated Product Support (IPS) Elements

A

12

35
Q

_____minimize the probability of inadvertent initiation and the severity of subsequent collateral damage due to accidents or actions by an adversary

A

Insensitive Munitions

36
Q

Executive order that directs the “greening of the gov’t” to be environmentally responsible

A

EO 13101

37
Q

There are how many mandatory system safety steps

A

8

38
Q

________ is any real or potential condition that can cause: Injury, illness or death to personnel; Damage to a system, equipment or property; Damage to the environment; The causal factor consists of one or several mechanisms that create the hazard.

A

Hazard

39
Q

A ______ (or undesired event) is an event or series of events resulting in death, injury, occupational illness, damage/loss of equipment or property, or damage to the environment

A

mishap

40
Q

3 Reasons for Loss of Vendors for Older Systems

A
  1. Obsolescence
  2. Diminished Manufacturing Source (DMS)
  3. Material shortages
41
Q

Performance parameters considered by the user to be the most essential, and expressed in threshold and objective values

A

KPP

42
Q

Unit Cost Reporting Requirements ACATs ID/IC

A

Nunn-McCurdy Breach from 1982

43
Q

_________ __________ is a “phased approach” to acquiring a major IT system.

A

Modular Contracting

44
Q

what type of software is used for weapon systems

A

Embedded Software

45
Q

what type of software is used for defense business systems (DBS), such as payroll

A

AIS

46
Q

during the _________ top-level design for each configuration item function and interface is evaluated to determine if it is ready for detailed design

A

preliminary design review (PDR)

47
Q

_________=BCWP-ACWP

A

Cost Variance

48
Q

Contracts of _____ or more require a formal EVM system validation

A

$50M

49
Q

There are _____ formats for the integrated program management report (IPMR)

A

7

50
Q

Only the _____can approve changes to the APB

A

MDA

51
Q

_______is comprised of mission reliability and logistics reliability

A

Reliability

52
Q

for EVM accounting system, the PM must be able to account for both labor and _____ costs

A

material

53
Q

For a _____ breach, the service secretary notifies congress within 45 days. DoD submits a Selected Action Report (SAR) w/ required unit cost breach information

A

significant

54
Q

the 6 major logistics functions are supply, maintenance, transportation, ______, health services, and other services

A

civil engineering

55
Q

_______ includes those logistics support activities that start as soon as the warfighter in the field receives the first system

A

Sustainment Logistics

56
Q

The ____________ is used by the supplier as part of the life cycle management to control evolution of the software

A

developmental baseline

57
Q
  1. The __________ describes details of all the supplier’s testing activities.
A

software test plan

58
Q

Best type of contract for software intensive systems?

A

CPAF

59
Q

the systematic evaluation of software products and activities by an agency that is not responsible for developing the product or performing the activity being evaluated

A

IV&V; independent verification and validation

60
Q

A method of counting or otherwise quantifying characteristics of a process or product.

A

Measure

61
Q

the resources, processes, procedures, design considerations, and methods to ensure that the system, equipment, and support items are properly packaged and preserved, handled, stored, and transported.

A

PHST

62
Q

having the right part in the right place at the right time in the right quantity at the most economical cost

A

supply support

63
Q

A measure of reliability

A

Mean Time Between Failure