1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
9

40 points!!! Which of the following is a disadvantage of outsourcing?

Computers and Technology
2 answers:
mr Goodwill [35]3 years ago
8 0

Answer:

c

Explanation:

I need 20 characters in my answer so tvcogct7zr7zuruzxicfficx7t8txr8zz8rz8rxt8c8tvyovoyb9h

Aleks04 [339]3 years ago
4 0

Answer:

C.

Explanation:

All the other options are obtainable.

You might be interested in
A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attendi
juin [17]

Answer:

The answer is "Option A".

Explanation:

In this question, the choice "A" is correct because in this a conditional if block statement is used that that use "IsFound" method that takes two parameters "afternoonList and Child" in its parameter and use the append method that takes "lunchList and child" in parameter and add values, that's why other choices are wrong.

3 0
3 years ago
How do you know if something is in the public domain
liraira [26]
You can start by looking at the date. Anything made before 1923, no matter what, will be definitely in the public domain. ... Most times, it's impossible to determine whether something is in the public domain just by the date. There are three ways you can find out definitively whether a work is in the public domain.
8 0
3 years ago
Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
Dmitriy789 [7]

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

<em>sed '/expression/{command;command;...;}' inputfile > outputfile</em>

  • First, for the expression part, we use /march/ to match all lines containing that string.
  • Then for the command part, we only use {d} command to delete every matching line found.
  • The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.
  • Finally "> result .txt" makes the script output to be saved into a file named result.txt
6 0
3 years ago
Different organizations implement different Information Systems base on their core business operations. explain
Mashutka [201]

Answer:

Different business or firm tend to enforce different Information Systems based completely on their main business operations, in order to best leverage data as an organizations asset. Some of these Information System are as follow:

a) Transaction Processing System (TPS):

A small organization tends to process transactions that might result from day-to-day activities, such as purchase orders, creation of paychecks and thus require using TPS.

b) Management Information System(MIS):

Managers and owners of small organizations tend to incline towards industry-specific MIS, in order to get historical and current operational data, such as inventories data and sales.

c) Decision Support System (DSS):

A DSS to allow managers and owners of small organizations to use predefined report in order to support problem-resolution decisions and operations planning.

7 0
3 years ago
The United States Army retains a history of all equipment acquisition from approval of requirements through funding, authorizing
Mama L [17]

Answer:

A. data mart

Explanation:

Data mart refers to a structure for storing and retrieving data. Often times, the data mart is usually specific to a business line.

The data contained herein is also specific to a particular department and by so doing this facilitate easy isolation, use and development of the data.

The major advantage of creating data marts is for easy accessibility of data.

7 0
3 years ago
Other questions:
  • Categories of general purpose application software and examples each​
    13·1 answer
  • What is my credit card billing zip code??
    15·1 answer
  • What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?
    8·2 answers
  • How will you create an email id
    11·1 answer
  • When does information become a liability for an organization
    6·1 answer
  • Accepting criticism is a trait of what people?
    5·1 answer
  • Grace is performing a penetration test against a client's network and would like to use a tool to assist in automatically execut
    13·2 answers
  • You are configuring two PCs for your network, PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192
    15·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
  • 1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!