1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
7

Discuss the technologies that implements an infrastructure for component communication

Computers and Technology
1 answer:
Akimi4 [234]3 years ago
4 0

Explanation:

Consulting and system integration services are relied on for integrating a firm's legacy systems with new technology and infrastructure and providing expertise in implementing new infrastructure along with relevant changes in business processes, training, and software integration. Legacy systems are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.

THE IT INFRASTRUCTURE ECOSYSTEM

There are seven major components that must be coordinated to provide the firm with a coherent IT infrastructure. Listed here are major technologies and suppliers for each

You might be interested in
What does the Latin word VIDEO mean?<br> 1 I vine<br> O I conquered<br> I see<br> I hear
brilliants [131]

It comes from the word: “I see”

4 0
3 years ago
Given the following code, what will it display?
trapecia [35]
Number#4 = 55 ; start counting from 0
4 0
4 years ago
Read 2 more answers
What should you do with a wireless-capable laptop if you connect a lan cable to it?
marusya05 [52]
A local-area network (LAN<span>)  cable is used in LAN networks to connect several computers or other networking devices.</span>
If you connect a LAN cable to a wireless-capable laptop you should turn the wireless capability off to maximize security, because through the LAN cable viruses can be transmitted, than can harm your computer.

6 0
3 years ago
Read 2 more answers
What is the correct terminology for a group of infected computers controlled by a person to commit cyber-crime?
Pavel [41]
I believe it’s called a virus or a hacker
5 0
3 years ago
A ____ is an area in ram or on the hard drive designated to hold input and output on their way in or out of the computer system.
Goshia [24]

A buffer is a region in RAM or on the hard drive assigned to hold information and yield on their way in or out of the framework. In <span>computer science , <span>an information cushion or simply support is a zone of a physical memory stockpiling used to briefly store information while it is being progress starting with one place then onto the next. However, a buffer might be utilized while moving information between forms inside a PC.</span></span>

4 0
4 years ago
Other questions:
  • Edhesive silly questionsj
    8·1 answer
  • Is a type of software program used to write code and develop other
    9·1 answer
  • Today’s mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
    7·1 answer
  • Explain briefly why we say that the "Web" exists only in our minds.
    14·1 answer
  • Why should you avoid the use of sarcasm , cliches, and idioms in business letters?
    6·2 answers
  • ​"To busy multitaskers who need help remembering​ things, Evernote is a digital content management application that makes it eas
    12·1 answer
  • According to the computer science what isCD ROM is a ​
    8·1 answer
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • Quality answers will be appriciated! :)​
    15·2 answers
  • What kind of animation is used in the powerpuff girls show??
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!