Test3 Flashcards

(63 cards)

1
Q

What is PAUC

A

Program Acquisition Unit Cost = $ Total Development + $ Procurement + $ Construction / Total Program Quantity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two TYPES of Maintenance

A
  1. Preventative
  2. Repair
    (3 Levels: Org, Intermediate, Depot)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First attainment of the minimum capability to employ a weapon, item, or system.

A

IOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(____) supports the acquisition process by ensuring that logistics considerations are properly planned, integrated, continue after fielding, and disposal of the system at end of useful life

A

Life Cycle Logistics (LCL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 Major Areas of LCL.

A
  1. Acquisition Logistics
  2. Sustainment Logistics
  3. Performance Based Life Cycle Product Support (PBL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A (___) is a term that includes personnel, supplies/equipment, and real property (land and facilities) necessary to deploy and sustain a weapon system.

A

Logistics Footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two goals for RMS (reliability, maintainability, and supportability).

A
  1. Higher Operational Effectiveness

2. Lower Ownership Costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(____) not only concerns the system itself but also the entire infrastructure of activities and resources that sustain overall support, and contribute to overall support cost (fuel, equipment, technical data)

A

Supportability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(_____) incorporates non-proprietary interfaces, protocols, industrial standards, interoperable components, and portability

A

Open Systems Architecture (OSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Measure of Maintainability

A

Mean time to repair (MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ requires the PM to provide PESHE (programmatic environment, safety, and occupational health evaluation)

A

DoD 5000.02

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 ways to analyze and document potential hazards

A
  1. Categorical Exclusion (CATEX)
  2. Environmental Assessment (EA)
  3. Environmental Impact Statement (EIS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For a Weapons System, system and software _______ will be among its predominant critical requirements.

A

safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

for a C4I system, ________ issues will be among its predominant critical requirements.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

for a Defense Business System, _______ issues will be among its predominant critical requirements.

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The mandatory framework defines multiple “views” of an architecture.

A
  1. Operational (OV)
  2. Systems (SV)
  3. Standards (StdV)
  4. All (AV)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the purpose of the ________ ________ _______is to ensure programs protect their technology, components, and information thru the acquisition process during design, development, delivery and sustainment.

A

Program Protection Plan (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The 4 components of Downtime

A
  1. Logistics Delay
  2. Administrative Delay
  3. Corrective Maintenance
  4. Preventative Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Directs PMs to eliminate ESOR risks and manage residual ESOH risks?

A

MIL-STD-882

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The ____ is developed by PM at milestone ____, and updated prior to each milestone.

A

Acquisition Program Baseline / MS B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A critical breach to the APB is greater than ___% of the current baseline estimate and ___% of the original baseline estimate

A

25% / 50% (Significant Breach are +15% and +30%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When a program deviation occurs, the PM must notify the MDA ____ and follow up within ____ days to explain the reason for the problem and corrective steps taken.

A

Immediately / 30 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The PM has the flexibility to work within the____ between threshold and objective parameters.

A

Tradespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Responsibility Assignment Matrix (Ram) shows the intersection of the _____ and _____.

A

WBS (work to be done) and the OBS (who does the work)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
3 steps to develop the performance measurement baseline (PMB).
1. Define the Work (WBS) 2. Schedule the Work 3. Allocate Budgets
26
____is a formal review conducted jointly between the gov't and contractor, mandatory for all EVM
Integrated Baseline Review (IBR)
27
2 Major Types of EVMS surveillance
System Surveillance and Program/Contract Surveillance
28
How many EVMS guidelines
32
29
What type of software is used for communications?
C4ISR (CMD, control, comms, computers, intel, surveillance and recon)
30
Common Software Development Approaches
1. Waterfall 2. Incremental 3. Spiral 4. Agile
31
The ____ is the current act covering the acquisition of information technology.
Clinger-Cohen Act (CCA)
32
____ Provide an organization with a set of processes that, if done by qualified persons using appropriate tools and methods, will provide a capability to do effective and efficient engineering of systems, including their software components
Standards
33
Key INFOSEC technologies
1. Firewalls 2. Encryption 3. Antivirus Software
34
There are ____Integrated Product Support (IPS) Elements
12
35
_____minimize the probability of inadvertent initiation and the severity of subsequent collateral damage due to accidents or actions by an adversary
Insensitive Munitions
36
Executive order that directs the "greening of the gov't" to be environmentally responsible
EO 13101
37
There are how many mandatory system safety steps
8
38
________ is any real or potential condition that can cause: Injury, illness or death to personnel; Damage to a system, equipment or property; Damage to the environment; The causal factor consists of one or several mechanisms that create the hazard.
Hazard
39
A ______ (or undesired event) is an event or series of events resulting in death, injury, occupational illness, damage/loss of equipment or property, or damage to the environment
mishap
40
3 Reasons for Loss of Vendors for Older Systems
1. Obsolescence 2. Diminished Manufacturing Source (DMS) 3. Material shortages
41
Performance parameters considered by the user to be the most essential, and expressed in threshold and objective values
KPP
42
Unit Cost Reporting Requirements ACATs ID/IC
Nunn-McCurdy Breach from 1982
43
_________ __________ is a "phased approach" to acquiring a major IT system.
Modular Contracting
44
what type of software is used for weapon systems
Embedded Software
45
what type of software is used for defense business systems (DBS), such as payroll
AIS
46
during the _________ top-level design for each configuration item function and interface is evaluated to determine if it is ready for detailed design
preliminary design review (PDR)
47
_________=BCWP-ACWP
Cost Variance
48
Contracts of _____ or more require a formal EVM system validation
$50M
49
There are _____ formats for the integrated program management report (IPMR)
7
50
Only the _____can approve changes to the APB
MDA
51
_______is comprised of mission reliability and logistics reliability
Reliability
52
for EVM accounting system, the PM must be able to account for both labor and _____ costs
material
53
For a _____ breach, the service secretary notifies congress within 45 days. DoD submits a Selected Action Report (SAR) w/ required unit cost breach information
significant
54
the 6 major logistics functions are supply, maintenance, transportation, ______, health services, and other services
civil engineering
55
_______ includes those logistics support activities that start as soon as the warfighter in the field receives the first system
Sustainment Logistics
56
The ____________ is used by the supplier as part of the life cycle management to control evolution of the software
developmental baseline
57
40. The __________ describes details of all the supplier’s testing activities.
software test plan
58
Best type of contract for software intensive systems?
CPAF
59
the systematic evaluation of software products and activities by an agency that is not responsible for developing the product or performing the activity being evaluated
IV&V; independent verification and validation
60
A method of counting or otherwise quantifying characteristics of a process or product.
Measure
61
the resources, processes, procedures, design considerations, and methods to ensure that the system, equipment, and support items are properly packaged and preserved, handled, stored, and transported.
PHST
62
having the right part in the right place at the right time in the right quantity at the most economical cost
supply support
63
A measure of reliability
Mean Time Between Failure