wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PERT Overview

profile
Zayed Lalljee
Sep 14, 2022
0 Likes
0 Discussions
188 Reads

 

PERT event: a point that marks the start or completion of one or more activities. It consumes no time and uses no resources. When it marks the completion of one or more activities, it is not "reached" (does not occur) until all of the activities leading to that event have been completed.

 

predecessor event: an event that immediately precedes some other event without any other events intervening. An event can have multiple predecessor events and can be the predecessor of multiple events.

 

successor event: an event that immediately follows some other event without any other intervening events. An event can have multiple successor events and can be the successor of multiple events.

 

Besides events, PERT also knows activities and sub-activities:

 

PERT activity: the actual performance of a task which consumes time and requires resources (such as labor, materials, space, machinery). It can be understood as representing the time, effort, and resources required to move from one event to another. A PERT activity cannot be performed until the predecessor event has occurred.

 

PERT sub-activity: a PERT activity can be further decomposed into a set of sub-activities. For example, activity A1 can be decomposed into A1.1, A1.2 and A1.3. Sub-activities have all the properties of activities; in particular, a sub-activity has predecessor or successor events just like an activity. A sub-activity can be decomposed again into finer-grained sub-activities.

 

PERT has defined four types of time required to accomplish an activity:

 

optimistic time: the minimum possible time required to accomplish an activity (o) or a path (O), assuming everything proceeds better than is normally expected

 

pessimistic time: the maximum possible time required to accomplish an activity (p) or a path (P), assuming everything goes wrong (but excluding major catastrophes).

 

most likely time: the best estimate of the time required to accomplish an activity (m) or a path (M), assuming everything proceeds as normal.

 

expected time: the best estimate of the time required to accomplish an activity (te) or a path (TE), accounting for the fact that things don't always proceed as normal (the implication being that the expected time is the average time the task would require if the task were repeated on a number of occasions over an extended period of time).


Comments ()


Sign in

Read Next

Memory Management - operating system

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Memory Management

Blog banner

What Is Experiential Learning and Why Does It Work Better Than Rote Learning?

Blog banner

Ubiquitous Computing

Blog banner

Cache Memory in Operating Systems

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

What is semaphore in operating system?

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Multicore and multithreading 171

Blog banner

Data Warehousing

Blog banner

Man In The Middle Attack

Blog banner

EdTech (Education Technology)

Blog banner

Brain wash of social media

Blog banner

"Audit" In Data Science

Blog banner

Blockchain

Blog banner

NodeJs

Blog banner

AI and cyber Security

Blog banner

How to make Pancakes

Blog banner

Big O Notation

Blog banner

MAILFENCE

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Memory Management

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Race Condition in Operating Theatre

Blog banner

What is Data, Information and Knowledge?

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Deadlock

Blog banner

Types of Malware in Cyber Security

Blog banner

Study of Sniffing Tools

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Steganography and Steganalysis

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

virtual machines and virtualization

Blog banner

Explain website hacking issues

Blog banner

Race Conditions

Blog banner

Real-time Scheduling - 53003230061

Blog banner