Question: A resource constraint can be exploited using CCPM methodology by: determining the priority among projects for access to the drum. scheduling each project to start
A resource constraint can be exploited using CCPM methodology by:
determining the priority among projects for access to the drum.
scheduling each project to start based on the drum schedule.
designating the critical chain as the chain from the first use of the constraining resource to the end of the project.
resolving any conflicts if the creation of the capacity constraint buffers adversely affects the drum schedule.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
