Hiring an outside company to perform some or all of a systems development project is called _____.
a. virtual reality
b. offshoring
c. systems investigation
d. outsourcing
Ans: d. outsourcing
Computer Science & Information Technology
You might also like to view...
To properly secure a database, special keys should be disabled, because special keys allow users access to the Navigation Pane and the Visual Basic Editor even if these items are hidden from view initially in the database
Indicate whether the statement is true or false
Computer Science & Information Technology
What is the maximum range for a Bluetooth class 2 device?
A) ~3 feet B) ~15 feet C) ~27 feet D) ~33 feet E) ~100 feet
Computer Science & Information Technology