Explain vendor exploitation.

What will be an ideal response?

Once the client firm has divested itself of specific assets it becomes dependent on the vendor. The vendor may exploit this dependency by raising service rates to an exorbitant level. As the client's IT needs develop over time beyond the original contract terms, it runs the risk that new or incremental services will be negotiated at a premium. This dependency may threaten the client's long term flexibility, agility and competitiveness and result in even greater vendor dependency.

PTS: 1

Computer Science & Information Technology

You might also like to view...

Dedicated ________ are lightweight, inexpensive devices that can hold thousands of books

A) e-ink readers B) e-books C) e-readers D) netbooks

Computer Science & Information Technology

Which of the following methods should a technician perform to properly clear a hard drive before disposal?

A. Delete the FAT B. Zero all block sectors C. Delete the partition D. Zero the NTFS journal

Computer Science & Information Technology