Connect with LearnSmart Access Card for Business Driven Technology
7th Edition
ISBN: 9781259852183
Author: Paige Baltzan, Amy Phillips
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 18, Problem 4MBD
Explanation of Solution
Challenges of Outsourcing:
- The challenges of outsourcing includes:
- Length of contract:
- It becomes difficult to break contract.
- It is difficult to forecast business requirements for several years.
- Loss of confidentiality:
- It may lose confidential information to wrong hands.
- Threat to competitive advantage:
- The trade secrets of company may get revealed.
- The vital information regarding business operations are shared among different entities.
- Length of contract:
Cultural, language and legal issues:
- The cultural challenges includes:
- Gender tolerance differences, religious beliefs, customs
- Social attitudes
- Work style difference and business relationships
- Location and time zone dealings
- Difference in labor cost
- The steps to mitigate these risks include:
- A common code of conduct should be generated while outsourcing.
- Time zone should be framed based on client side.
- The work style should be clearly mentioned...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Description
Body mass index (BMI) is a number calculated from a person’s weight and height.According to the Centers for Disease Control and Prevention, the BMI is a fairlyreliable indicator of body fatness for most people. BMI does not measure body fatdirectly, but research has shown that BMI correlates to direct measures of body fat, such as underwater weighing and dual-energy X-ray absorptiometry. The formula for BMI is Weight/Height2
Where weight is in kilograms and height is in meters.
Write a program that prompts for metric weight and height and outputs the BMI.
For example, an execution could look like this:Please enter weight in kilograms: 50Please enter height in meters: 1.58BMI is: 20.0288415318
Case Study:An old school Ice cream shop that was quite popular in the neighborhood for manyyears, is suffering huge loss because of the opening of a nearby supermarket thathosts a variety of ice creams in their freezer section. The ice cream shop was oncepopular for their unique flavored ice creams but they are unable to predict thesupply and demand causing many customers to get disappointed because they goout of stock every so often. The owner of the ice cream shop is your friend and asksyou for advice to resolve this problem. Take him through the SDLC phases andpresent requirements, designs and a project plan for your proposed system to theowner.2. Draw Entity Relationship Diagram for the proposed system based on therequirements showing the Entities, Attributes and Cardinality between entities
Problem C. Front Tooth ConcealmentYou have recently been appointed vice principal of a high school, and as such, you have the
honor of helping out with their graduation ceremony. You will alternate reading off the names of the graduates with the principal. Unfortunately, you got your front teeth knocked out last night while fighting crime as a masked vigilante, so you are unable to pronounce any name containing the letters ‘s’ or ‘z’. Since you don’t want your enemies to learn of your secret identity, and you suspect that some of them may be present at graduation, you need to avoid saying any names containing the letters ‘s’ or ‘z’. You will read the first name from the list of graduates, meaning that you will also read the third, the fifth, the seventh, and so on. Therefore, you must ensure that all names at odd positions in the list of names (or at even indexes, since we start indexing at 0), do not contain the letters ‘s’ or ‘z’.
Write a function avoid_sz(names_list) which takes in…
Chapter 18 Solutions
Connect with LearnSmart Access Card for Business Driven Technology
Knowledge Booster
Similar questions
- Don’s Lumber Company on the Hudson River features a large selection of materials for flooring, decks, moldings, windows, siding, and roofing. The prices of lumber and other building materials are constantly changing. When a customer inquires about the price on prefinished wood flooring, sales representatives consult a manual price sheet and then call the supplier for the most recent price. The supplier in turn uses a manual price sheet, which has been updated each day. Often, the supplier must call back Don’s sales reps because the company does not have the newest pricing information immediately on hand. Assess the business impact of this situation, describe how this process could be improved with information technology, and identify the decisions that would have to be made to implement a solution.arrow_forwardLegal and Ethical use of IT Case study While mingling with neighbours at a party, Ato mentions that he is responsible for evaluating bids for a large computer software contract. A few days later, Ato receives a lunch invitation from one of his neighbours who also attended the party. Over appetizers, the conversation turns to the contract Ato is managing. Ato’s neighbour seems remarkably well informed about the bidding process and likely bidders. Ato volunteers information about the potential value of the contract and briefly outlines the criteria his firm will use to select the winner. At the end of the lunch, Ato’s neighbour surprises him by revealing that he is a consultant for several companies in the computer software market. Later that day, Ato’s mind is racing. Questions 1. Did Ato reveal information that could provide a supplier with a competitive advantage in the bidding process? 2.What are the potential business risks and ethical issues in this situation? Should Ato report…arrow_forwardCorrect and detailed answer will upvoted else downvoted. You have gotten information from a Bubble bot. You realize your assignment is to make plant offices, however before you even beginning, you need to realize how huge the production line is and the number of rooms it has. At the point when you check out the information you see that you have the elements of the development, which is fit as a fiddle: N x M. Then, at that point, in the following N lines you have M numbers. These numbers address processing plant tiles and they can go from 0 to 15. Every one of these numbers ought to be examined its paired structure. Since from each number you know on which side the tile has dividers. For instance number 10 in it's twofold structure is 1010, which implies that it has a divider from the North side, it doesn't have a divider from the East, it has a divider on the South side and it doesn't have a divider on the West side. So it goes North, East, South, West. It is ensured that the…arrow_forward
- Encryption is the technique of transforming information in such a way as to make its meaning unintelligible. Review the following statements regarding encryption and its terminology. I. It is not possible to encrypt media files such as photos or videos, only written text. II. Ciphertext is the name given to a text written in natural language (for example, Portuguese), which will undergo an encryption process. III. One of the functions of a cryptographic algorithm is to decipher a text that has been encrypted, that is, to decrypt a text, so that it can be read again in natural language. IV. Encryption is the modification of the minimal elements of the computation (that is, the bits) of what is being worked on (letters, numbers, etc.). Encoding is the modification of a set of information (words, phrases, etc.) Only the following items are correct: A) I e III B) I e IV C) II e III D) II e IV E) III e IVarrow_forwardComputer Science The government has recognized that it has a problem guaranteeing the supply of medicines throughout the country. To solve this, he is considering hiring a "Data Scientist" to help them. You, as an expert in statistics and information science, know that you can perform simulations of different scenarios. Describe IN LUXURY DETAIL how you could help him. Note: you must provide information on all the steps involved in your solution so that they decide to hire you.arrow_forwardEducation is the process of facilitating learning, or the acquisition of knowledge, skills, values, morals, beliefs, habits, and personal development. Educational methods include teaching, training, storytelling, discussion and directed research. Education frequently takes place under the guidance of educators; however, learners can also educate themselves. Education can take place in formal or informal settings, and any experience that has a formative effect on the way one thinks, feels, or acts may be considered educational. The methodology of teaching is called pedagogy. Describe the overriding benefits of education, training, and awareness.arrow_forward
- e company you own has a large supply of 8 inch by 15 inch rectangular pieces of metal sheets and you decide to make them into boxes by cuing a square form each corner and folding up the sides. e amount of money you get for a box depends on how much the box holds, so you want to make boxes with the largest possible volumes. How large a square should youarrow_forwardPromoting career development in the early years of a person’s life can be done in the early years to help children master developmental tasks and increase their career adaptability, which is made up of career confidence, career curiosity, career concern, and career control. DISCUSS the importance of Ethics and the Ethical considerations that a researcher should take into account when conducting a study, keeping in mind that the subjects may be minors.arrow_forwardAnnabelle Invests in the Market Annabelle Sizemore has cashed in some treasury bonds and a life insurance policy that her parents had accumulated over the years for her. She has also saved some money in certificates of deposit and savings bonds during the 10 years since she graduated from college. As a result, she has $120,000 available to invest. Given the recent rise in the stock market, she feels that she should invest all of this amount there. She has researched the market and has decided that she wants to invest in an index fund tied to S&P stocks and in an Internet stock fund. However, she is very concerned about the volatility of Internet stocks. Therefore, she wants to balance her risk to some degree. She has decided to select an index fund from Shield Securities and an Internet stock fund from Madison Funds, Inc. She has also decided that the proportion of the dollar amount she invests in the index fund relative to the Internet fund should be at least one-third but…arrow_forward
- Banks offer various types of accounts, such as savings, checking, certificate of deposits, and money market, to attract customers as well as meet their specific needs. Two of the most commonly used accounts are savings and checking. Each of these accounts has various options. For example, you may have a savings account that requires no minimum balance but has a lower interest rate. Similarly, you may have a checking account that limits the number of checks you may write. Another type of account that is used to save money for the long term is certificate of deposit (CD). In this programming exercise, you use classes and functions to design classes to manipulate various types of accounts. For simplicity, assume that the bank offers three types of accounts: savings, checking, and certificate of deposit, as described next. Savings accounts: Suppose that the bank offers two types of savings accounts: one that has no minimum balance and a lower interest rate and another that requires a…arrow_forwardSoftware engineering This requirement has a clarity problem; rewrite it to be better. "The communication app will verify that a student is in the professor’s class by making a POST request to Coursebook to check that information."arrow_forwardQuestion - khn.Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Operations Research : Applications and AlgorithmsComputer ScienceISBN:9780534380588Author:Wayne L. WinstonPublisher:Brooks ColeC++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage Learning
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning