Are bpos safe for organisations ? State your views on it

Answers

Answer 1
Answer:

Answer:

No

Explanation:

Business process outsourcing is the act of contracting aspects of a business that are considered secondary to third-party vendors. These aspects of the business could range from Information Technology to accounting or quality assurance. Business process outsourcing has its advantages and disadvantages.

While it ensures flexibility and cost savings in the business, I believe that;

1. Releasing sensitive information about a business to people who are not within the confines of a business, could result in a breach in data handling. Sensitive information can no longer be entirely controlled by the business owners once in the hand of outsourced contractors. Information might get into the hand of hackers who can compromise business activities.

2. Given that some BPO's might require sourcing workers from countries abroad, and also considering the fact that different countries have different criteria as to what constitutes data handling breaches, it might sometimes be hard to enforce safety standards.

3. Quality control might also not be easy to achieve, and could be worsened by language and communication barriers.

4. If the organizations do not track their expenses religiously, they might end up spending more on outsourcing than they would have with employees. This might because they underestimated the pricing.

To handle these safety issues, the business owners might have to develop some very stringent methods of regulating Business Process Outsourcing.


Related Questions

Peter automates his email inbox such that his incoming mails are filtered with all junk mails sent directly to the spam folder. This saves him time as he does not have to sort through the mails to find his work-related mails. He also creates a group mailing list for his team that makes it easier for him to send mails to the entire team instead of including their email addresses individually. In this scenario, Peter is using information systems tools to ________.
Dot Notation can be used with lower(), upper() or str() string methods. true or false
What is a task? a piece of hardware physically or wirelessly connected to a computer, such as a hard drive or keyboard a partition on a hard drive; another way to reference a drive letter such asc. an event or action that causes the task to start an action performed by the system software, usually as a result of a trigger
Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why?A. Lossless compression since it ensures perfect reconstruction of the photo. B. Lossy compression since it ensures perfect reconstruction of the photo. C. Lossless compression since it typically results in smaller data sizes. D. Lossy compression since it typically results in smaller data sizes.
A router is a peripheral that may need troubleshooting if the network goes down.True False

A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the log and noticed that a group of alarms were generated by the IPS that identified normal user traffic. Which term describes this group of alarms? a) true negative
b) true positive
c) false positive
d) false negative

Answers

Answer:

c) false positive

Explanation:

An event signaling to produce an alarm when no attack has taken place. False positives are mislabeled security alerts, indicating there is a threat when in actuality, there isn’t. By default, most security teams are conditioned to ignore false positives, In the event of a false positive an IPS will actively stop the normal activity which is likely to negatively impact business functions.

Answer:

C. False positive.

Explanation:

Penetration testing or pen test is a mechanism used by organisation to test or check for vulnerabilities attackers could exploit in their private network. This process is vital for strengthen the security policies of an organisation's network.

There are several types of penetration testing that can be used, they are blind testing, black box testing, white box testing, internal and external testing etc. Several packets and protocols are tested to ensure a secure network. when a test is done, an alarm is given to notify the tester of the current status. The false positive alarm is seen when a normal user traffic is detected but gives off false negative when the case is reverse.

Which of the following symbols would not be seen in the syntax for Java variables, methods, or arguments? {}
()
??
[]

Answers

Answer:

??

Explanation:

?? is invalid syntax

When declaring or initializing variables names, and when writing methods, or arguments ?? is not used in Java .

() [] {} all these are used with variables , methods or arguments.

User productivity systems include programs that enable users to share data, collaborate on projects, and work in teams. Which of the following is an example of this type of program?

Answers

Answer:

Groupware            

Explanation:

Groupware also called a collaborative software enables a group of people in a network to concurrently use the same program or software or work on the same project. An example is Lotus Notes which is a program that enables users to exchange emails, calendar sharing, share documents so that all users can view same information and work on the same data at the same time. This helps people to work on a common project to achieve their goals. This collaboration to accomplish a common goal can be achieve via shared internet interfaces which enable users to interact within the group. The advantage of groupware is that participants of groupware don't have to be in the same location and also their personal existence is not necessary. Another advantage of groupware is that the project can be completed in a timely manner and every participant can see the progress of the project.

Which of the following statements is true?a. Old paper documents, which were previously only available offline, are increasingly being imported and becoming available on the Internet.b. Information that may not be retrievable today may be retrievable tomorrow due to changes in terms of service, public policy, law, and technical privacy settings.c. Improvements in searching techniques enable search engines to gather information from, and make meaningful connections between, a greater number of data sources.d. All of the above

Answers

Answer:

i believe its d

Explanation:

i took it before and i got 100

Assume that an array named a containing exactly 5 integers has been declared and initialized. Write a single statement that adds 10 to the value stored in the first element of the array.

Answers

Answer:

"a[0]=a[0]+10;", is the correct answer for the above question.

Explanation:

  • An array is defined as a user-defined data type used to store multiple variables of the same type in a continuous passion in a memory.
  • To declare an array a user needs to define the size and it referred many variables by one name but the index of that variable is different,
  • The array takes an index from 0 to (size-1). It means that the first index of the array is 0. So if the name of that array is A then the first variable name is A[0].
  • The above-question says that there is an array of name 'a' then its first variable name is a[0] then we can add 10 to its like "a[0]=a[0]+10". Here '=' is an assignment operator and '+' is an addition operator.

The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these. The following table shows pairs of octal numbers:A B
a. 3174 0522
b. 4165 1654

1) What is the sum of A and B if they represent unsigned 12-bit octal numbers? The result should be written in octal. Show your work.

Answers

a).
3174
0522
---------
3716

b).
 4165
 1654
--------------
10111

Sorry.  This is all that can be shown.  The rest is all verbal.