当前位置:网站首页>2022年PMP项目管理考试敏捷知识点(1)
2022年PMP项目管理考试敏捷知识点(1)
2022-06-24 06:44:00 【张佩服的石头】
2022年PMP考试将使用新版考纲,改版后的PMP考试敏捷题型比重上升,为了帮助广大考生尽早掌握PMP考试中的敏捷知识点,将2022PMP考试敏捷相关信息做了整理,快来看看吧。
都是干货,要认真阅读~需要资料可在文末查看~
敏捷宣言
我们正在通过亲自开发和帮助他人开发,发现开发软件的更好方法。通过这项工作,我们开始更重视:
【个体和交互】胜于【流程和工具】
【工作的软件】胜于【详尽的文档】
【客户合作】胜于【合同谈判】
【响应变化】胜于【遵循计划】
也就是说,右栏中的项目固然有价值,但我们更重视左栏中的项目。
敏捷十二原则
准则1:我们的最高目标是,通过尽早和持续地交付有价值的软件来满足客户。
准则2:欢迎对需求提出变更,即使在项目开发后期也不例外。敏捷过程要善于利用需求变更,帮助客户获得竞争优势。
准则3:要经常交付可用的软件,周期从几周到几个月不等,且越短越好。
准则4:项目实施过程中,业务人员与开发人员必须始终通力合作。
准则5:要善于激励项目人员,给予他们所需的环境和支持,并相信他们能够完成任务。
准则6:无论是对开发团队还是团队内部,信息传达最有效的沟通方法是面对面的交谈。
准则7:可用的软件是衡量进度的首要衡量指标。
准则8:敏捷过程提倡可持续的开发。项目发起人、开发人员和用户应该保持步调。
准则9:对技术的精益求精以及对设计的不断完善将提高敏捷性。
准则10:简洁,即尽最大可能减少不必要的工作。这是一门艺术。
准则11:最佳的架构、需求和设计出自于自组织团队。
准则12:团队要定期反省怎么做才能更有效,并相应地调整团队的行为。
敏捷阶段框架
相较于结构化项目管理的启动、规划、执行、监控、收尾五大过程组,部分流派将敏捷也做了一个五阶段框架:构想、推演、探索、适应、结束。他们不能直接跟结构化项目管理中五大过程组完全匹配对应,但是可以粗略这样对应。
构想阶段,得到产品愿景;
推演阶段,得到用户故事清单、产品待办事项列表、产品发布计划等;
探索阶段,执行得到完成的用户故事;
适应阶段,对完成的进行把关;
结束阶段,完结整个项目。
对应在备考期间复习资料也是必不可少的,有利于重点标记学习,知识点整理,更加有效率的学习。有需要的可以点击这里进去自取↓↓↓↓还在备考PMP的小伙伴,也是可以免费做题的!(项管大神出题+解析)↓↓↓↓↓↓↓↓

边栏推荐
- A summary of the posture of bouncing and forwarding around the firewall
- Tencent cloud security and privacy computing has passed the evaluation of the ICT Institute and obtained national recognition
- Win11 points how to divide disks? How to divide disks in win11 system?
- 选择器(>,~,+,[])
- jarvisoj_ level2
- [DDCTF2018](╯°□°)╯︵ ┻━┻
- get_ started_ 3dsctf_ two thousand and sixteen
- 【Vulhub靶场】】zabbix-SQL注入(CVE-2016-10134)漏洞复现
- [Proteus] Arduino uno + ds1307+lcd1602 time display
- How to select a third-party software testing company? 2022 ranking of domestic software testing institutions
猜你喜欢
╯︵ ┻━┻](/img/26/6986a8ae6c00eb2431a082dc0ff978.png)
[DDCTF2018](╯°□°)╯︵ ┻━┻
![[frame rate doubling] development and implementation of FPGA based video frame rate doubling system Verilog](/img/38/92486c92557e6e5a10a362eb2b7bdf.png)
[frame rate doubling] development and implementation of FPGA based video frame rate doubling system Verilog
![[image fusion] image fusion based on directional discrete cosine transform and principal component analysis with matlab code](/img/21/a5a973f06ea002755a8a2a4431dcd8.png)
[image fusion] image fusion based on directional discrete cosine transform and principal component analysis with matlab code

Dichotomous special training

Prefix and topic training

The first common node of two linked lists_ The entry of the link in the linked list (Sword finger offer)

Combine with (& &) logic or (||), dynamic binding and ternary operation

Analog display of the module taking software verifies the correctness of the module taking data, and reversely converts the bin file of the lattice array to display

The fund management of London gold is more important than others

How can genetic testing help patients fight disease?
随机推荐
How to open the soft keyboard in the computer, and how to open the soft keyboard in win10
Obtain the package name, application name, icon, etc. of the uninstalled APK through packagemanager. There is a small message
Reconfiguration of nebula integration testing framework based on BDD theory (Part 2)
Deploy L2TP in VPN (medium)
[mrctf2020] thousand layer routine
20 not to be missed ES6 tips
MaxCompute远程连接,上传、下载数据文件操作
[learn FPGA programming from scratch -41]: vision chapter - Moore's era and Moore's law and the arrival of the post Moore Era
与(&&)逻辑或(||),动态绑定结合三目运算
Win10 build webservice
Global and Chinese markets for maritime transport of perishable goods 2022-2028: Research Report on technology, participants, trends, market size and share
The fund management of London gold is more important than others
Deploy L2TP in VPN (Part 2)
How VPN works
[WUSTCTF2020]爬
[frame rate doubling] development and implementation of FPGA based video frame rate doubling system Verilog
阿里云全链路数据治理
[image fusion] image fusion based on directional discrete cosine transform and principal component analysis with matlab code
Spark stage and shuffle for daily data processing
What is a CC attack? How to judge whether a website is attacked by CC? How to defend against CC attacks?