Explain vendor exploitation.

What will be an ideal response?


Once the client firm has divested itself of specific assets it becomes dependent on the vendor. The vendor may exploit this dependency by raising service rates to an exorbitant level. As the client's IT needs develop over time beyond the original contract terms, it runs the risk that new or incremental services will be negotiated at a premium. This dependency may threaten the client's long term flexibility, agility and competitiveness and result in even greater vendor dependency.

PTS: 1

Computer Science & Information Technology

You might also like to view...

Which of the following methods of FileStream will reset the file-position pointer back to the beginning of the file?

a) Reset b) Origin c) Seek d) Beginning

Computer Science & Information Technology

Which is not an effectiveness objective of the database?

A) ensuring that data can be shared among users for a variety of applications B) ensuring all data required for current and future applications will be readily available C) allowing the database to evolve and the needs of the users to grow D) allowing users to construct their personal view of the data without concern for the way the data are physically stored E) maintaining data that are both accurate and inconsistent

Computer Science & Information Technology

You can name a database only after you have created it

Indicate whether the statement is true or false

Computer Science & Information Technology

Match the following terms to their meanings:

I. Page Number II. Orientation III. Accounting IV. Vertical V. Concatenation A. Header and Footer element B. Number format C. Page Setup command D. Alignment option E. Order of precedence

Computer Science & Information Technology