1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
2 years ago
7

List and describe four services that comprise IT infrastructure, beyond physical devices and software applications.

Computers and Technology
1 answer:
masha68 [24]2 years ago
6 0

The four services that comprise IT infrastructure are:

  • Telecommunications services.
  • Data management services .
  • Application software services.
  • Physical facilities management services.

<h3>What does these services do?</h3>

Telecommunications services is known to help in terms of giving data, voice, and video network.

Data management services helps to save , manage, and analyze all data. Application software services helps to give firms-wide range capabilities.

The Physical facilities management services helps to make and handle physical installations of technology.

Therefore, The four services that comprise IT infrastructure are:

  • Telecommunications services.
  • Data management services .
  • Application software services.
  • Physical facilities management services.

Learn more about  IT infrastructure from

brainly.com/question/869476

#SPJ1

You might be interested in
How can I use HTML to express a personal value
Mama L [17]

Answer: Order list

Explanation:

7 0
2 years ago
Given half a chance other people at work will take advantage of you
Damm [24]

have self-control and if you have a problem dont be afraid to speak your mind, show other people you mean buisness, but be polite to aviod starting more problems

3 0
3 years ago
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget th
never [62]

Answer: key escrow

Explanation:

Using key escrow we are able to recover data if passphrase is forgotten. this technique uses a bypass link to get all the keys to the system only if it is an authorized entry.

7 0
3 years ago
If i don't update my computer what threat does my computer face?
Nadusha1986 [10]
Hey there! Hello!

Computer updates, especially smaller security updates, contain security information for new bugs, malware, viruses, etc. that have been written since your last update. So many of these are written for computers at any given time, meaning that keeping your computer updated is a significant step in keeping your computer's defense systems working. Paired up with legit anti-malware, virus protection software, good computer knowledge, and common sense, your computer can remain very safe from these viruses. 

Otherwise, there might be some bug or irregularity within your computer's system itself that was accidentally released an update or two ago by the creators of your computer's software, which may also pose a threat for your computer system. Updating your computer can most likely fix problems like these. But, more commonly, they just keep your computer up to date on the vicious computer threats that are now available for it since the previous update. 

Hope this helped you out! Feel free to ask me any additional questions if you have any. :-)

8 0
3 years ago
What is the most common way to perform searches in a search engine?
valina [46]
Using key words is the best way to search things in the search engine. make sure everything is spelled correctly.
5 0
3 years ago
Other questions:
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·2 answers
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • In which of the following ways can using test-taking tips help you?
    7·1 answer
  • The _____ handles the instructions for your computer to start up before the operating system is loaded.
    10·1 answer
  • "Packet switches have multiple links attached to them. For each attached link the packet switch has a/an ____________, which sto
    7·1 answer
  • Which command do you use to save a document with a new name? Choose the answer.
    10·2 answers
  • Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th
    9·1 answer
  • What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
    12·2 answers
  • Which of the following described a global network connecting billions of computers and other
    10·2 answers
  • The contrast ratio of green-60 text on a yellow-10 background is ___ to 1.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!