1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
7

Limitations of the information systems used by tesco​

Computers and Technology
1 answer:
Kryger [21]3 years ago
8 0

Answer:

The only disadvantage or the limitation systems is due to the outsourcing policies. Outsourcing is done to take advantage of low-cost labor in various developing countries. However, through outsourcing, companies loses control over management, results in confidentiality and security issues. The quality also decreases, as the third parties are driven by profit. There is disbelief among the employees as well concerning the knowledge management system due to outsourcing, as they believe the whole setup to be suspicious. And there is various hidden cost also related to outsourcing like the cost of lawyers, as you need to hire one to take care of the contracts. Some more disadvantage might also be sited but all are related to outsourcing, and else the information systems used looks like being quite great.

Explanation:

Please check the answer section.

You might be interested in
Choose the term that best matches the definition.
Y_Kistochka [10]

Answer: it’s network protocol

Explanation:

4 0
2 years ago
Comments can be hidden by clicking the _____ button.
Tamiku [17]
C because previous sends you back to something before such as a web page, Next does the opposite and I can't remember what Show MarkUp does.

5 0
3 years ago
How to save a file for the first time?​
White raven [17]

by typing ctrl+ s on keyboard

7 0
3 years ago
Read 2 more answers
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
timofeeve [1]
A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
8 0
3 years ago
Coefficient of x in expansion (x+3)(x-1)<br>​
neonofarm [45]

Answer:

the coefficient of x here is 4

Explanation:

pls let me know if its wrong or right ..i"ll try another way than:?

5 0
3 years ago
Read 2 more answers
Other questions:
  • In three or four sentences, describe how a person buys and sells stock.
    6·2 answers
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • ______ are single numbers or values, which may include integers, floating-point decimals, or strings of characters.
    10·1 answer
  • blank affect your vision because your eye muscles are tired along with the rest of your body and is difficult to focus
    11·2 answers
  • Advancements in technology that might be helpful for individuals who need accommodations to perform computer tasks include _____
    15·2 answers
  • 2. Name the three building blocks of design that pertain to form.
    7·1 answer
  • Where (what memory location) is the data read from for the following code:
    12·1 answer
  • describe a situation in which peer pressure could cause a serious problem for safe driving, and how you could resist the peer pr
    8·2 answers
  • My messaging system is messed up. It keeps saying I'm getting messages but then it says nothing new in my inbox. I'm confused- H
    15·2 answers
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!