List the primary steps in the request for proposal process.

What will be an ideal response?


(1). Conduct a user needs analysis.
(2). Develop a purchase specification for the equipment or software, based on the needs analysis, to describe the technical characteristics and features of the hardware or software it wants to acquire.
(3). Define the decision criteria and the importance of each criterion. Many criteria are based on mandatory or desirable product features; other criteria include technical support, vendor stability, product costs, and compatibility with existing technology.
(4). Write the RFP document, which describes the user requirements, bidding procedure, and decision criteria.
(5). Send the RFP document to prospective vendors (some organizations maintain a list of vendors who are prescreened to meet acceptable financial stability criteria).
(6). Receive written proposals from interested vendors that address how their products meet or exceed the user requirements and include a bid price at which each vendor can supply the products or services.
(7). Analyze the responses to the RFP and have the user support staff evaluate them, often using weighted point evaluation methods.
(8). Select a vendor and award the purchase contract.

Computer Science & Information Technology

You might also like to view...

Is it possible to change the spelling and grammar checker default settings in Office 2010?

A) Yes, by clicking the File tab and clicking the Options button. B) Yes, but the setting changes are only active for the current document upon which you are working. C) Yes, by clicking the Review tab and the Spelling & Grammar button. D) No, the settings cannot be changed.

Computer Science & Information Technology

Windows firewall with advanced security provides a connections security rule called _______________ that enables you to limit connections according to authentication criteria that you define

a. Isolation b. Authentication exemption c. Server-to-server d. Tunnel

Computer Science & Information Technology

Compressing a file decreases the file size.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?

A. Security system project manager B. Computer security specialist C. Computer security incident responder D. Security analyst

Computer Science & Information Technology