1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
10

Few companies today could realize their full-potential business value without updated ________. Select one: a. IT investments ma

de on the basis of immediate needs or threats b. IT infrastructures and services c. IT investments that are patches d. Reactive approaches to IT investments
Computers and Technology
1 answer:
Alenkasestr [34]3 years ago
6 0

Answer:

b. IT infrastructures and services

Explanation:

IT infrastructure or information technology infrastructure refers to the various components involved in the functioning of an IT enabled operations. These components include; hardware, software, network resources, etc.

It is usually internal to an organization and deployed within the confines of its own facilities.

You might be interested in
computer hardware without software is useless while computer software without hardware is meaningless. explain what do you under
Rainbow [258]

Answer:

That the software is useless

Explanation:

6 0
3 years ago
Years ago when working a helpdesk, the most common question asked, almost daily, was about resetting passwords. What type of kno
ser-zykov [4K]

Answer:

What is the importance of NIOSH and OSHA in the service desk environment? They conduct research on work environments and provide recommendations relating to areas such as preventing work-related illnesses and injuries and creating safe and comfortable work spaces.

Explanation:

3 0
2 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
When you go to a website, your web browser requests a web page from:
lakkis [162]

Answer: web server

Explanation:

When you go to a website, your web browser requests a web page from the web server. For this to happen, the IP address for the webpage has to be identified first, tmaftee which the browser will request appropriate data from the web server.

Such request comes in form of data packet and takes place through HTTP and.utnhas all the necessary information that is needed by the web server for the delivery of the webpage data.

3 0
3 years ago
Are these even bangs
PSYCHO15rus [73]

Answer:

um very long bangs

bangs are supposed to be in the middle and it has to be short so you can see and be stylish

6 0
3 years ago
Read 2 more answers
Other questions:
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • Three consecutive even integers heve a sum of 66. find the integers
    7·1 answer
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • Why would it be a bad idea for gateways to pass broadcast packets between networks? What would be the advantages of doing so
    12·1 answer
  • I have to write a program with a function that finds the biggest out of 3 numbers, but the problem is i have to use a reference
    6·1 answer
  • Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
    15·1 answer
  • __________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
    15·1 answer
  • What is computer? Write is features <br><br><br><br><br>​
    14·1 answer
  • THE DIFFERENCE BETWEEN COPY AND PASTE AND CUT AND PASTE IS: *
    5·2 answers
  • Who would win in a fight, Noble 6 from halo reach or Master Chief??
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!