1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
3 years ago
14

In the context of Information Technology Infrastructure Library, _____ delivers information technology IT services on an ongoing

basis while monitoring the overall quality of the service. Select one: a. service design b. service operation c. service transition d. service strategy
Computers and Technology
1 answer:
WINSTONCH [101]3 years ago
5 0

Answer:

C. Service operations

Explanation:

Service operation monitors and carryout the activities on a daily basis and monitor the overall quality of processes required to deliver and manage services.

You might be interested in
Create a Python script that takes two parameters to do the following:-
tekilochka [14]

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

6 0
3 years ago
Evan accidentally entered an incorrect word when he was typing a document. Which keyboard shortcut should he use to undo the err
agasfer [191]
CTRL Z is the redo action so thats your best bet
8 0
3 years ago
Read 2 more answers
Why might your coworker suggest encrypting an archive file before e-mailing it??
Genrish500 [490]
Because to prevent MITD (Man in the middle is a man that in the middle of the network. For example: You are sending a text, the man in the middle or in the modem will receive the text and can edit it and send it to the receiver, or the man will put the virus in...) and to prevent server snooping
8 0
3 years ago
You have the following code:
My name is Ann [436]

Answer:

7

Explanation:

We already have the functions that tells us how much to add. If you add all this, you will get 12. HOWEVER because cantaloupe is in the list, the computer does not count that. So if we add that again without 5(how much the cantaloupe costs), we get 7.

3 0
2 years ago
Jefffffffffffffffffffffffffcfffryyyryrryryyyyyyyyyyyyyyynhghgnc nb hc
kati45 [8]

Answer:

huh?

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • When technology advances which of the following always takes place?
    6·2 answers
  • To change the caption for a field in a query, click the field in the design grid, click the ____ button on the Design tab, click
    14·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • What is the function of napier's bones<br>​
    8·1 answer
  • Which goal of design theory can be described as the proper distribution
    7·1 answer
  • Which option correctly describes a DDMS application?
    6·1 answer
  • Я люблю есть гнезда петух
    11·1 answer
  • What equipment allows a computer to connect to the internet.
    13·1 answer
  • Who is katie and why is she deleting my answers
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!