Explanation:
The term IT infrastructure refer to an enterprise which is basically a collection of various hardware, software, network components, data network and data centers that are being used to do some development, testing related to IT related services. So the major components of IT infrastructure are:
1) Hardware solutions
2) Software Solutions
3) Various Network Component
4) Data Centers
Business Intelligence is basically a technology driven process that is being used analyze various data and the information in more effective and more informed way. The role of business Intelligence is given in following points:
1) Business Intelligence plays a vital role in identifying the technology required for our business.
2) As we knew that Business Intelligence is technology driven, so technology identification is major part that is being done my this process
3) With business Intelligence we chose the best technology required for our business, its help in increasing the profit of the business.
4) We can business Intelligence is the major process that deal with identifying all the technology needs of the business
The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.
Explanation:
- Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
- To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
- A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
Answer:
All of this above.
Explanation:
All the mentioned practices can be use to prevent breaches.