Which of the following is not a way of validating purchased software information?
A) Reviewing software documentation and technical marketing literature
B) Sending prospective vendors a questionnaire asking specific questions about their packages
C) Using the software yourself and running it through a series of tests based on the criteria for selecting software
D) Obtaining feedback from other users of the software
E) Purchasing the software first and then testing
E
Explanation: E) All of the following except for E are best practices for evaluating purchased software.
You might also like to view...
To minimize the risk of system downtime, Grizzly Corporation stores its data on multiple disk drives simultaneously. This practice is called
A) downtime minimization plan. B) redundant arrays of independent drives. C) redundant arrays of independent backups. D) patch backup management.
Which of the following statements about net neutrality is not true?
A) The FCC now regulates ISP pricing. B) The FCC ruled that Internet broadband service providers should be viewed as public utilities similar to telephone companies. C) The FCC overruled state laws that made it difficult for cities to operate their own broadband networks. D) ISPs can no longer discriminate against users on the basis of protocol or amount of usage.