1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
2 years ago
5

Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?

Computers and Technology
1 answer:
mixas84 [53]2 years ago
8 0

Explanation:

 The term IT infrastructure refer to an enterprise which is basically a collection of various hardware, software, network components, data network and data centers that are being used to do some development, testing related to IT related services. So the major components of IT infrastructure are:

1) Hardware solutions

2) Software Solutions

3) Various Network Component

4) Data Centers

Business Intelligence is basically a technology driven process that is being used analyze various data and the information in more effective and more informed way. The role of business Intelligence is given in following points:

1) Business Intelligence plays a vital role in identifying the technology required for our business.

2) As we knew that Business Intelligence is technology driven, so technology identification is major part that is being done my this process

3) With business Intelligence we chose the best technology required for our business, its help in increasing the profit of the business.

4) We can business Intelligence is the major process that deal with identifying all the technology needs of the business

You might be interested in
Hi there! I am writing a code to make a square using a drone, however I’m having trouble doing so. The website that I’m writing
Jlenok [28]

Answer:

i might

Explanation:

3 0
2 years ago
What term is used to describe a list of security policies that is associated with an object?
Artemon [7]

Answer:

An Access control list (ACL) is used to describe a list of security policies that is associated with an object

5 0
3 years ago
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
Slav-nsk [51]

My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is the process by which one can  invalidate a TLS/SSL and this is one that is often done before its scheduled expiration date.

Note that A certificate need to be revoked immediately  and as such, based on the case above, My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about network administrator from

brainly.com/question/4264949

#SPJ1

8 0
1 year ago
PLEASE HELP!!!
mezya [45]

Answer:

I'm not exactly sure on what the question is, but from reading it, I determined that you'll be creating 2 different designs using Inkscape/Photoshop. I'm leaving 2 of my designs in here for you to use on your project. Unknown on what to do about the design that wasn't created in an image-editing program.

4 0
2 years ago
How did<br> technological artifacts evolved over time?
adell [148]
With helping us communicate with each other and around the world with the internet and other different types of things like,Tesla’s,phones,touch screen IPads,even having a built in TV plane
3 0
2 years ago
Other questions:
  • Calculate the total number of bits transferred if 200 pages of ASCII data are sent using asynchronous serial data transfer. Assu
    5·1 answer
  • Help please?
    10·1 answer
  • How does a spreadsheet affect a column of numerals when it sorts the column
    15·2 answers
  • I have all the points to level up to virtuoso, but it hasn't yet does anyone know when it will?
    9·1 answer
  • A browser is used for creating Web pages. true or false?
    5·2 answers
  • What is the value of i printed? j = i = 1 i += j + j * 5 print("What is i?", i)
    11·1 answer
  • IRQ 0 interrupt have _______________ priority<br> ? low<br> ? medium<br> ? highest<br> ? lowest
    13·1 answer
  • Which skill type refers to the ability to interact and communicate effectively with people? skills refer to the ability to inter
    8·2 answers
  • How many times is the body of the loop executed?
    8·1 answer
  • If consumers start to believe they need a product, what is likely to happen
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!