Explain any constraints in using the top-down versus bottom-up approach in duration estimating.
What will be an ideal response?
The first part of this answer should show the contrast between top-down and bottom-up and the
accuracy of information as a function of the source. The next part of this answer should reflect
the influence of management in developing duration estimating (top-down) and the constraints
that can impose.
You might also like to view...
Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being aware of the interception and potential modification to the communications?
A. Spear phishing B. Main-in-the-middle C. URL hijacking D. Transitive access
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
Answer the following statement true (T) or false (F)