1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
1 year ago
9

What are the functions of information technology?

Computers and Technology
1 answer:
Gekata [30.6K]1 year ago
3 0

There are six basic functions of IT.

1. Capture: Compiling detailed records of activities.

2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.

3. Generation: Organizing information into a useful form.

4. Storage: Retaining information for further use.

5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.

6. Transmission: Distributing information over a communication network.

You might be interested in
Hi am feeling really happy just passed a test after a lot of tries :-)
Bess [88]

Answer:

1. real life 2. (my actual answer) horizon zero dawn 3. chess

Explanation:

hope you have a great day. congratulations

6 0
2 years ago
Why are cable networks such as mtv and cnn more profitable than the big four broadcast networks?
aalyn [17]
<span>Cable television was developed to deliver broadcast television signals to communities with poor reception.
</span><span>Cable networks such as MTV and CNN are more profitable than the big four broadcast networks because </span>viewers pay for subscriptions and companies pay for advertising. Viewer pay monthly fee for viewing cable TV and companies pay in order their campaign to be broadcasted.
8 0
3 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building
Likurg_2 [28]

Answer:

B. EoP

Explanation:

EoP could be used to network this building as per the scenario given.

5 0
3 years ago
What are the differences between Cc &amp; Bcc in emails that are sent ?​
Ket [755]

Cc stands for " carbon copy " and Bcc stands for " Blind carbon copy ". The difference between Cc and Bcc is that carbon copy (CC) recipients are visible to all other recipients whereas those who are BCCed are not visible to anyone.

8 0
3 years ago
Read 2 more answers
Other questions:
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • ________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how
    6·1 answer
  • Which of the following correctly describes the function of an IP address
    13·1 answer
  • Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down
    8·1 answer
  • What is a boolean in Java
    5·1 answer
  • Count the number of words in the string. A word is one or more non-blank characters separated by one or more blanks. My suggesti
    13·1 answer
  • Why do people still use Intel HD graphics for gaming?
    8·1 answer
  • You need to update both the DEPARTMENT_ID and LOCATION_ID columns in the EMPLOYEES table using one UPDATE statement. Which claus
    5·1 answer
  • Select the statements that are true regarding IP addresses. Check All That Apply assigned to your home network by your ISPassign
    13·1 answer
  • What are tasks performed by pascaline?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!