1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
10

Few companies today could realize their full-potential business value without updated ________. Select one: a. IT investments ma

de on the basis of immediate needs or threats b. IT infrastructures and services c. IT investments that are patches d. Reactive approaches to IT investments
Computers and Technology
1 answer:
Alenkasestr [34]3 years ago
6 0

Answer:

b. IT infrastructures and services

Explanation:

IT infrastructure or information technology infrastructure refers to the various components involved in the functioning of an IT enabled operations. These components include; hardware, software, network resources, etc.

It is usually internal to an organization and deployed within the confines of its own facilities.

You might be interested in
Does anyone know the answers?
frez [133]

Answer: nah bruh sorry

Explanation:

4 0
3 years ago
Mary is troubleshooting her company's LAN network. She finds out that data segments that the client is encoding are resulting in
kicyunya [14]

Answer:

Data link layer of OSI model is creating the erroneous segments

Explanation:

The Open System Interconnection (OSI) model is a conceptual framework about how communication occurs between devices over the Internet. It has seven layers, (Physical, Data, Network, Transport, Session, Presentation and Application layer). The purpose of this hierarchical layer system is to understand the structure of communication between devices and do troubleshooting easily if a fault occurs. As in this question, Marry is troubleshooting her company LAN network. She finds out that data segments that the client is encoding are resulting in errors in the encoding. Now the question arises, how she found the cause of the error. The OSI model helps her in understanding the problem.

As you know, the data link layer of the OSI model is responsible for the encoding and decoding of data segments. This layer ensures the reliability of the physical layer, and responsible to provide error-free transfer of data from one node to another on a network. It is also responsible for frame synchronization and flow control. The data link layer is divided into sub-layers:

1. Media Access Control Layer: this layer controls how a computer on the network gains access to the data and transmission permission.

2. Logical Link Control Layer: This layer controls frame synchronization, error checking and flow control.

Therefore, Marry founds data link layer of the OSI model is creating the erroneous segments in encoding.

6 0
3 years ago
General equation: y = (89 / 27) - z * x + a / (a % 2) (recall: a is an integer; the 89 and 27 constants in the equation should b
liraira [26]

Answer: Here is an Incomplete question submitted

Explanation:

6 0
2 years ago
Question #4
Igoryamba

Answer:

The y-intercept is going to fall by -2 but the x-intercept will run +5

Explanation:

Becuase the derivative of the equation causes this when plugged into the formula

6 0
2 years ago
System Architecture: Describe the system architecture. Specifically, be sure to address the corporate organization and culture,
alekssr [168]

Answer:

Explanation:

In information technology, architecture plays a major role in the aspects of business modernization, IT transformation, software development, as well as other major initiatives within the enterprise. IT architecture is used to implement an efficient, flexible, and high quality technology solution for a business problem, and is classified into three different categories: enterprise architecture, solution architecture and system architecture. Each of these classifications varies in their implementation and design, depending on the contextual business scope, organization structure, and corporate culture.

Architecture Level

Architecture level represents the scope boundary and granularity of details the architectural activity should take, based on organization hierarchy and communication audience.

  • Enterprise Architecture (Company level) aligns technological strategies and execution plans with business visions and objectives by providing architectural oversight and guidance. Enterprise architecture also drives consolidation, reuse, and economy of scale by addressing company-wide goals in a holistic way across all IT projects.
  • Solution Architecture (Department level) models a solution vision that defines the IT systems, business processes and reusable services for a specific business unit, spanning across business and technology architectures.
  • System Architecture (Team level) defines the structure of an information system in terms of various subsystem components and their relationships with internal and external systems. System architecture focuses on application, data, and technology, and is called software architecture in some organizations.

Before making decision regarding system architecture the designer must consider the following points:

  • Corporate organization and culture: System architecture must study day-to-day functions of business and users in order to understand corporate organization and culture. This will help in focusing on operational feasibility which will help in deciding other checklist items.
  • Enterprise resource planning (ERP): Most of the organization use ERP software these days and it is important for the analyst to understand the compatibility of the ERP which is used to the proposed system.
  • Total cost of ownership (TCO): System analyst must try to get solutions of different questions which helps in finding initial cost and cost which may add up during the development, which is total cost of ownership. This is most important at this will determine total cost and budget of system.
  • Scalability: Determining system ability to expand or downsize according to business requirements.
  • Security: What security system and policy needs to be implemented.
7 0
3 years ago
Other questions:
  • Which of the following information security technology is used for avoiding browser-based hacking?
    11·2 answers
  • The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
    12·1 answer
  • A hard drive cannot be partitioned until the device _________ is set.
    15·1 answer
  • A media scholar is trying to find out whether internet or television political ads are more persuasive. what kind of effects is
    7·1 answer
  • What is the leading use of computers
    15·2 answers
  • You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
    12·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • Please help me ASAP! Here is the question.
    15·1 answer
  • The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!