answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
2 years ago
8

Are bpos safe for organisations ? State your views on it

Computers and Technology
1 answer:
frozen [14]2 years ago
8 0

Answer:

No

Explanation:

Business process outsourcing is the act of contracting aspects of a business that are considered secondary to third-party vendors. These aspects of the business could range from Information Technology to accounting or quality assurance. Business process outsourcing has its advantages and disadvantages.

While it ensures flexibility and cost savings in the business, I believe that;

1. Releasing sensitive information about a business to people who are not within the confines of a business, could result in a breach in data handling. Sensitive information can no longer be entirely controlled by the business owners once in the hand of outsourced contractors. Information might get into the hand of hackers who can compromise business activities.

2. Given that some BPO's might require sourcing workers from countries abroad, and also considering the fact that different countries have different criteria as to what constitutes data handling breaches, it might sometimes be hard to enforce safety standards.

3. Quality control might also not be easy to achieve, and could be worsened by language and communication barriers.

4. If the organizations do not track their expenses religiously, they might end up spending more on outsourcing than they would have with employees. This might because they underestimated the pricing.

To handle these safety issues, the business owners might have to develop some very stringent methods of regulating Business Process Outsourcing.

You might be interested in
First, open two separate terminal connections to the same machine, so that you can easily run something in one window and the ot
dusya [7]
Dnt listen to da file shi
7 0
2 years ago
Bill needs to make a presentation in which he has to represent data in the form of a pyramid. Which feature or menu option of a
andreyandreev [35.5K]

Answer:If you need to use arrows in a chart, which feature or menu option of a word processing program would you use?

A.  

Picture

B.  

Shapes

C.  

Clip Art

D.  

SmartArt

E.  

Charts

Explanation:

7 0
2 years ago
Write a for loop to print each contact in contact_emails. Sample output for the given program:
Paladinen [302]

Answer:

Correct code for the above question which is written in the place of loop in the above question code:

for a,b in contact_emails.items(): # for loop to print the above items one by one.

   print(str(b)+" is "+str(a)) # print statement to print the item of the list.

Output:

  • The above code is in python language which display the output as the above question demands.

Explanation:

  • The above question code is in python language, so the for loop to prints the list is defined in the answer part.
  • The for loop syntax defined in the question part is not correct. It never gives the output which the question demands.
  • The above list defined in the question part is in the form of key-value pair which comes in the categories of the dictionary concept.
  • So to print the above list, any user needs an item function that will display the output in the key-value pair.
  • There is also needs two variables in the 'for' loop one is for key and the other is for value.

4 0
2 years ago
The molecule 2,2-diisopropylheptane is incorrectly named. what is the correct name?
pentagon [3]
Isopropyl is: CH3 - CH - CH3
                                |

Heptane is: CH3 - CH2 - CH2 - CH2 - CH2 - CH2 - CH3

Then 2,2 isopropyl heptane is:

CH3 - CH - CH3
           |
CH3 - C - CH2 - CH2 - CH2 - CH2 - CH3
           |
CH3 - CH - CH3.

There you can count that the longest carbon chain has 8 carbon atoms.
So the right name is of an octane.

I will rearrange the chain to show the 8 carbon chain in a row:

           CH3   CH3
           |          |
CH3 - CH -   C - CH2 - CH2 - CH2 - CH2 - CH3
                      |
           CH3 - CH - CH3

Now, you can see that the right name is 3 isopropyl - 2, 3 dimethyl octane




5 0
2 years ago
A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
Butoxors [25]

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

5 0
2 years ago
Other questions:
  • Convert the following binary number to octal (111000)2​
    12·1 answer
  • John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues.
    12·1 answer
  • Write a function string middle(string str) that returns a string containing the middle character in str if the length of str is
    13·1 answer
  • In cell J4, calculate
    8·1 answer
  • 1. Write a set of routines for implementing several stacks and queues within a single array. Hint: Look at the lecture material
    15·1 answer
  • A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled liv
    7·1 answer
  • #Write a function called fancy_find. fancy_find should have #two parameters: search_within and search_for. # #fancy_find should
    9·1 answer
  • In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
    10·1 answer
  • JAVA Write a program that first asks the user to type a letter grade and then translates the letter grade into a number grade. L
    9·1 answer
  • In a particular field, there are trees in a l single row from left to right. Each tree has a value V You cut trees from left to
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!