1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
4 years ago
13

One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o

r outsourcing software for information systems projects. What are the advantages of creating custom software in-house? What are the disadvantages of this approach?
Computers and Technology
1 answer:
yarga [219]4 years ago
3 0

Answer:

Custom software in-house is the software developed for any particular organization or person in an organization .This is designed on the basis of requirement and circumstances of the company.

The advantages of custom software in-house are as follows:

  • Customization is present at good level
  • Provides controlling capability
  • Helps in giving knowledgeable supporting tool

The cons of the custom software in-house are as follows :-

  • Lacking of expertise in software management  
  • Mostly have difficult bugs and errors
  • Adaptation towards new platform is an issue

You might be interested in
How can we compare a computer with human beings?
LenaWriter [7]

Answer:

Our brain as a central information processor vs. computer having a central processing unit

Our brain takes sensory input → processing/ sense making → in order to produce behavior as output. Computers work similarly: information input → processing → output task

Computers requires both hardware and software to function. Our body is essentially hardware, what we learn from formal education and informal life experiences are software.

Explanation:

8 0
4 years ago
Match letters from column B to Column A by looking at the picture above.
yarga [219]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about mapping correct terms with their number in the given picture. The correct matching of Column A and Column B is given below

Column A                               Column B

Horizontal axis                        3

Legend                                    4

Vertical axis                             2

Chart Data                               1

5 0
4 years ago
Sensitive security information can be shared with whom
lukranit [14]
Details? Referring to what? Using what?


8 0
4 years ago
Read 2 more answers
Peyton is having trouble searching for information on butter lettuce. Every time he searches for it, he gets some results for bu
Svetllana [295]

Explanation:

don't search butter lettuce it's a veggie so you say butter lettuce vegetable

7 0
3 years ago
Read 2 more answers
__________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
sergey [27]

<u>Swap files </u>contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost any other work that has occurred during past Windows sessions.

Explanation:

I order to simulate extra space an operating system like windows use hard disk space in order to stimulate extra memory.When a computer system is running low with the memory space the swap file swaps a section of RAM onto the hard disk in order to obtain a free memory space.

This Process at times results in  slowing down of the computer  computer considerably.

<u>The combination of RAM and swap files is known as virtual memory.</u>

It is due to the  use of virtual memory that our computer is able to  run more programs than it could run in RAM alone.

4 0
3 years ago
Other questions:
  • Which protocol would you utilize to upload files to a web server?
    14·1 answer
  • "the firewall acts as a proxy for which two types of traffic? (choose two.)"
    14·1 answer
  • ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
    11·1 answer
  • Adding functionality to a Button is easy when you use the IDE. After you have dragged a Button onto a Form, you can ____ it to c
    7·1 answer
  • Describe the difference between cellular, wi-fi and wired networks.
    8·1 answer
  • What is a form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move?
    7·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    7·1 answer
  • What is an example of CT SO?
    9·1 answer
  • Consider the following code segment, where num is an integer variable.
    6·1 answer
  • What is the function of ROM?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!