2. You are a project manager at a project company developing wireless mobile applications. You are currently in the risk identification process, where you are trying to identify and document all risk that might impact the project.
You have assembled your experts both from inside and outside the company. You have asked them to make a anonymous questionnaire to identify the potential risks of the project. The experts will then mail back the questionnaire directly to you. Once you have received the feedback, you intend to organize the responses in order to compile a final list of potential project risks. Which of the following best describes the techniques are you using?