Hiring an outside company to perform some or all of a systems development project is called _____.

a. virtual reality
b. offshoring
c. systems investigation
d. outsourcing

Ans: d. outsourcing

Computer Science & Information Technology

You might also like to view...

To properly secure a database, special keys should be disabled, because special keys allow users access to the Navigation Pane and the Visual Basic Editor even if these items are hidden from view initially in the database

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the maximum range for a Bluetooth class 2 device?

A) ~3 feet B) ~15 feet C) ~27 feet D) ~33 feet E) ~100 feet

Computer Science & Information Technology