Indicating the main factors that influenced policy decision

Assignment Help Computer Engineering
Reference no: EM1325350

Hardware maintenance is usually provided through a defined service contract negotiated between the organization purchasing the hardware and the vendor selling the hardware. At the heart of the maintenance contract is the response time in which the vendor repairs the issue. This is a major factor in the cost of the maintenance agreement.

Consider the following two policies.

- Setting aside a budget of $100,000 and purchasing a reserve of hardware components and fixing hardware issues with internal staff.
- Purchasing a maintenance contract for $200,000 that guarantees all repair services will be completed in a 4-hour window from the time they are reported.

In your view, which of the two policies listed above would be the most beneficial to an IT department's budget? Explain, indicating the major factors that influenced your policy decision.

Reference no: EM1325350

Questions Cloud

Responsible business in 21st century : In what ways is the company which you are analyzing applying social cost accounting? Give specific examples. Are they using financial indicators to measure social and environmental costs? Describe how they are doing this, giving examples.
Integration of knowledge for competency and development : overemphasis on cultural differences when that is not the issue or avoid tunnel vision and personal biases.
Customers need with the right product : Meeting the customers need with the right product or services is main key for success.
Explain e-marketing tools used by carsdirect : Explain E-Marketing tools used by CarsDirect and describe the Internet marketing tools used by this website
Indicating the main factors that influenced policy decision : Hardware maintenance is usually provided by a defined service contract negotiated between the organization purchasing the hardware and the vendor selling the hardware.
Discussing the cognitive restructuring theory : What is the purpose of the cognitive restructuring theory? Explain. How would the cognitive restructuring theory help Tom from the scenario above in handling his excessive anger? Explain.
Distinguish between vertical and horizontal integration : Advantages and Disadvantages of Vertical and Horizontal Integration - Define and distinguish between vertical and horizontal integration.
Intelligence scores from various cultures : Research has shown important differences in intelligence (IQ) scores from one culture to the other.
Explain how an enterprise system : Enterprise system - Explain how an enterprise system can assist an organization in optimizing its value system

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define purpose and role of an is steering committee

What is the purpose and role of an IS steering committee, or advisory board.

  What is meant by user cantered design

What is meant by ‘user cantered design'

  Transmitting message and tentative checkpoint

Is node P allowed to transmit the messages related to application (as opposed to message which is part of checkpoint algorithm itself) immediately after having taken a tentative checkpoint?

  Ai and intelligent agents supporting knowledge management

Explain how the AI and intelligent agents provide support to the knowledge management. Explain it in the 1 paragraph with source.

  How to set up or recover cybersecurity

How to set up or recover cybersecurity.

  What is compensation of using rule sets

What is compensation of using rule sets

  Photoshop cs5 and cs5

Explain the programs that are available in order to edit the images? Explain at least two of the attributes available in the Photoshop CS5 and CS5.

  Developing the website-based sales system

Consider that you have been hired in order to develop the website-based sales system for the large international retail sales firm.

  Lan based attacks

Discuss or describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) or share any additional thoughts you may have on the LAN based attacks.

  Describing the structure

Suppose that a new type known as POINT has been described-- it is a structure consisting of the two fields, x and y, both of type double. Suppose two variables p1 and p2 of kind POINT have been declared.

  What are pros and cons of society''s increasing reliance data

What are pros and cons of society's increasing reliance data

  Describe what java environment contain to pass an arraylist

Describe what Java environment contain to pass an ArrayList

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd