After migrating the company’s entire datacenter infrastructure to a private IaaS solution, while at the same time maintaining the current network and server logical configuration, the IT director eliminated 50% of the IT engineering staff. The remaining staff has now shifted focus from a daily server maintenance and upkeep role, to more of a service provisioning, performance, and reporting role. Which of the following was MOST impacted by this migration?
A. Service design
B. Service strategy
C. Service operation
D. Service transition

Answers

Answer 1

Answer: C. Service operation

Explanation:

Based on the information given in the question, the service operation will be mostly impacted by the migration.

Service operation simply means the day-to-day activities, and processes which are responsible for the delivery of value through technology to the business.

Since the the company’s entire datacenter infrastructure has been migrated to a private IaaS solution, this will affect the service operation.


Related Questions

Select the four bad password ideas.

A) lists of numbers in order, such as 1234

B) your name or your child's name

C) the word "password"

D) an inside joke you have with yourself

E) the name of the website

F) strings of random numbers

Answers

Answer:

the word "password", the name of the website, lists of numbers in order, such as 1234, your name or your child's name

Answer:

A,C,E,B

Explanation:

1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *

Answers

Answer:

Retailing.

Explanation:

La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.

Describa las etapas del arranque de viruta

Answers

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

Recently mobile phones have been used to pay for goods in stores and supermarkets.

One methodof payment involves holding the phone close to a reader in the store.Discuss the advantages and disadvantages of this method of payment compared with other methods of credit/debit card transactions.

Answers

Answer:

The advantages of using mobile phones to pay for goods in stores are;

1) The ability to pay for goods and/or services without having to carry a physical wallet, thereby making payments faster, more convenient, and safer as the contents of a money wallet or purse cannot be seen

2) The generation of security codes for each transactions, the use of PIN input and finger sprint scanning for payment, ensures access to payment authorization is limited and requires definitive authentication and that payment transactions will not need to be scrutinized by merchants to detect fraudulent transactions

3) Paying with the mobile phone increases privacy as the card used for payment will be known only to the person doing the payment, thereby a person can use a credit card with low limit without displaying them

The disadvantages of using mobile phones to pay for goods in stores includes;

1) The possibility of breach in security of the mobile phone during payment. Sensitive information of the mobile phone can be collected during payment and then used in other places without the permission of the owner of the phone

2) Mobile phone payment may not be suitable to people who prefer card or cash payment

3) The different mobile phone payment applications and platforms are not entirely compatible and can lead to payment challenges

Explanation:

Why is computer called information processing maching???​

Answers

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).

HOPE IT HELPS ❣️

Answer:

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine or IPM.

Explanation:

Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool

Answers

Answer: Adjustment layer

Explanation:

The image editing tool or technique that should be used by Carter use is an adjustment layer.

The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.

By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.

Answer: B: an Adjustment Layer

Explanation: Correct for Edmentum/Plato

Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.

Answers

Answer on https://pastebin.com/raw/nHzXvbPP

3 Negative ways of using the Internet​

Answers

Answer:

1. It rots the mind of children

2. It's to too addicting

3. can show bad things.

Explanation:

1. Cyber bullying.
2. Gambling (playing games where you win money)
3. Identity theft, hacking.

A programmer for a weather website needs to display the proportion of days with freezing temperatures in a given month.


Their algorithm will operate on a list of temperatures for each day in the month. It must keep track of how many temperatures are below or equal to 32. Once it's done processing the list, it must display the ratio of freezing days over total days.
Which of these correctly expresses that algorithm in pseudocode?
A.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

DISPLAY(numFreezing/numDays)

}

B.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

C.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp < 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

D.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

numDays ← numDays + 1

}

}

DISPLAY(numFreezing/numDays)

Answers

Answer:

B.

Explanation:

The correct Pseudocode for this scenario would be B. This code makes two variables for the number of total days (numDays) and number of freezing days (numFreezing). Then it loops through the entire data set and checks if each temp is less than or equal to 32 degrees. If it is, it adds it to numFreezing, if it is not then it skips this step, but still adds 1 to the total number of days after each loop. Once the entire loop is done it prints out the ratio, unlike answer A which prints out the ratio for every iteration of the loop.

numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?
A. Quarantine Vivian's computer.
B. Disable System Restore.
C. Perform a scan using anti-malware software.
D. Back up Vivian's critical files and perform a clean install of Windows.

Answers

Answer: D

Explanation: Using anti malware software is a good method but you can never be 100% sure it's gone and the software may not detect it, better to start off clean.

The answer is D hope it helps

describe the uses of computer in different fileds? please help me ​

Answers

Answer:

Computers are used to perform several industrial tasks. They are used to design products, control manufacturing processes, control inventory, manage projects, and so on. Computers are used to control and manage different manufacturing systems and continuous running of the industry.

In terms of technology, wich of the four devices is the most recent?

a. keyboard
b. joystick
c. scanner
d. camera​

Answers

Joystick (1972)

They consider the typewriter a keyboard…late 1800’s
Scanner (1957)
Camera (late 1800)

Realiza una tabla acerca de los escenarios de usos más comunes de Excel.

Answers

Answer:

Microsoft Excel es una hoja de cálculo producida por Microsoft. La aplicación es ampliamente utilizada en empresas e instituciones, así como por usuarios domésticos. Su uso principal es realizar cálculos (por ejemplo, gastos) compilados en forma tabular. Para este uso, se aplican numerosas funciones matemáticas, financieras y de base de datos disponibles en el programa. La duplicación semiautomática de las fórmulas creadas con el uso de diferentes variantes de direccionamiento (direccionamiento relativo, direccionamiento absoluto, direccionamiento mixto) también es de gran importancia. Microsoft Excel también se utiliza para crear muchos tipos de gráficos, útiles, entre otros, en física, matemáticas y economía. También incluye un sistema para la elaboración de informes utilizando el llamado tablas dinámicas, utilizadas en la realización de análisis comerciales.

what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super​

Answers

Answer:

B: micro

Explanations

a small computer that contains a microprocessor as its central processor.

Which headphones are a better option, the HyperX Cloud Stinger or the Logitech G432

Answers

Answer:

The Logitech ones.

Explanation:

Surprisingly I've used all 3 of them and the Logitech ones are the one with not only the best sound quality. And the mic isn't horrible either.

Why does brainly always say, "We're sorry, but we are not able to complete your registration at this time"?! Now I cant view any answers to any questions!

Answers

Answer and Explanation:

It's very likely a network issue. You could do a hard refresh on your browser or brainly app. Simply clear your application's cache or your browser data or cache and then try again. You could also try re-installing your app. If this doesn't work, please reach out to the Brainly customer support team for help.

An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input checking is appropriate?

Answers

Answer:

You should use an "if" statement to check whether the number is greater than 18 or less than 65.

Explanation:

You usually use "if" statements whenever you want to compare a number to another. Keep in mind that "if" statements are not only used for comparison!

Which option is not available in the Presenter view of a presentation?

Answers

Group of answer choices.

A. Next Slide Preview

B. Pen/Laser Pointer tools

C. Open Slide Show

D. Navigation Controls

Answer:

C. Open Slide Show

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Basically, the views that are available on the Microsoft PowerPoint application includes;

1. Slide Sorter.

2. Notes Page.

3. Reading Pane.

4. Presenter view.

Presenter view avails the user an ability to use two monitors to display his or her presentation. Thus, one of the monitors displays the notes-free presentation to your audience while the other monitor lets you view the presentation with notes that you have added to the slides, as well as the navigation and presentation tools.

Furthermore, the Presenter view was developed by Microsoft Inc. to have the following options;

I. Next Slide Preview.

II. Pen/Laser Pointer tools.

III. Navigation Controls.

However, Open Slide Show is an option which is not available in the Presenter view of a presentation.

Can someone please type a code that makes a house in python and turtle graphics i need help

Answers

Answer:

import turtle  

turtle.speed(2)

#shape

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

#door

turtle.left(90)

turtle.forward(50)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(50)

#windows

turtle.penup()

turtle.right(90)

turtle.forward(20)

turtle.right(90)

turtle.forward(20)

turtle.pendown()

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

Explanation:

:)

Full from of Computer
: )​

Answers

Answer:

COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.

Explanation:

In you question, it isn't from! it is form(;

Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.

But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.

What is the main device used on fourth generation computer​

Answers

Answer: Microprocessors were used to create the fourth generation of computers. In 1971, Intel built the first microprocessor, the 4004 chip.

Explanation: The microprocessor is a silicon chip with millions of transistors built using LSI and VLSI technologies.

hope this helps best of luck mate! :)

help please I would really appreciate

Answers

Answer:

the answer is address bar

Answer:

This is called an address bar

Explanation:

It tells your computer where to send the data and what website you are trying to communicate with.

:)

Select three advantages of cloud computing.

A) large amount of storage capacity

B) no Internet access required

C) great flexibility

D) enhanced security

E) easily managed

Answers

Answer:

easily managed, large amount of storage capacity, great flexibility

Explanation:

Hadoop is : open source software framework designed for distributing data-processing over inexpensive computers. data mining platform designed for storing and analyzing big data produced by web communications and transactions. high-speed platform used to analyze large data sets pre-configured hardware-software system designed for analyzing big data. NoSQL database technology that stores both data and procedures acting on the data as object

Answers

Answer: open-source software framework designed for distributing data-processing over inexpensive computers.

Explanation:

Hadoop refers to the collection of open-source software utilities which are important in facilitating the use of a network of several computers to solve big data.

It provides huge storage for different kinds of data, and the ability to handle concurrent tasks virtually. Therefore, the correct option is "open-source software framework designed for distributing data-processing over inexpensive computers".

Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. The area also has a large variety of organism diversity. What biome did Nina most likely visit?

Answers

Answer: Rainforest

Explanation:

A rainforest is an area that typically has tall, green trees and also has a high amount of rainfall. Rainforest can be found in the wet tropical uplands and lowlands. The largest rainforests can be seen in the Amazon River Basin.

Since the area visited by Nina has a large amount of precipitation during all twelve months, typically warm year round and has a large variety of organism diversity, then the biome thatcNina most likely visited is the rainforest.

Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network

Answers

Answer:

  Port      a number used within a computer to identify a specific process.

   IP Address     a numerical reference to a particular device in a network.

   Server           a computer that handles requests and returns data to other computers in a network.

Explanation:

A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;

i. a file transfer protocol (FTP) could use a port number of 20 or 21.

ii. a simple mail transfer protocol (SMTP) could use a port number of 25

Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90

A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers  in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.

Answer:

IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network

port: a number used within a computer to identify a specific process

server: a computer that handles requests and returns data to other computers in a network

Explanation:

edge 2022

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. This is an example of violation of ___________________.

Answers

Answer:

The answer is "Authentication"

Explanation:

The attacker had the opportunity to log into the legitimate users' stolen credentials in Boeing systems and other firms in this question. That's an example of a verification violation.

This is a recognition of the identification of a user. Various students typically require various kinds of certificates in order to create the identity of the user. The credentials are frequently a passcode that only people and the computer know and seem to be confidential.

You are going to create multiple functions that will take in the appropriate measurements as parameters and calculate the area of the specific shape.

The following shapes must be included:
Square, Triangle, Circle, and Trapezoid

Feel free to add on more shapes if you want!!

Answers

Answer:

circle

Explanation:

Answer:

circle

Explanation:

list any three positive impacts of computer technology in our society?

Answers

Answer:

nWhich statement about the origins of the American population is true?

A most Americans descend from people who first populated this continent about 20,000 years ago

b about 98 percent of Americans live in this country due to the waves of Irish and German people who came in mid 1800s

c immigration expander the American population before 1806 ,bur has no significantly contributed to it since then

d the vast majority. of Americans ms either descended from immigrats or are immigrants themselves

Explanation:

sjsikskakakakakkakznxjduwjawjieieiwiwiwiwiwiw idek computer mouse laptopdhsjsjsjsjjsjs

Other Questions
what revovles around the sun and is made out of rock,ice,gas,and dust? Triangle PQR has vertices P(-2, 6), Q(-8, 4) and R(1, -2). It is translated according to the rule (x, y)> (x, - 2, y -16).What is the y-value of P?a. -18b. -16c. -12d. -10 Bertie won the lottery! He spends 4/5 of his money on a large house. He spends 3/4 of his REMAINING money on a luxury yacht. He spends 2/3 of his remaning money on a trip to space. He gives the remaning $50,000 to a charity. How much did he win? scripture union was founded by who in what year Frank has $8000 that he plans to split into two investments. He wrote the following two equations to represent the interests he will earn from each of the two investment options. Hello can someone help me understand this explanation? I dont understand how they got 5x=5 Thank you! An electron with a charge of -1.6 x 10-19 C experiences a force of 9.2 x 10-15 N. What is the intensity of the electric field? what are the approximate measurements of each given measurement to the nearest centimetre, then find the sum: 16.4 cm + 12.8 mm + 9.6 cm + 14.6 mm Tomato juice comes in three different sized cans. The red can contains 6 cups, the blue can contains 2 pints, and the yellow can contains 32 fluid ounces. Part A Which can holds the most tomato juice? Enter red, blue, or yellow in the answer box. lisa had wood that was 12 1/2 feet long. she cut it into 5 pieces that are equal in leangth.how long is each piece of wood? Maryssa wants to learn more about the origins of classical music. What should she research to find the MOST logical connections to classical music?ancient Greek musicancient Egyptian musicancient Mesopotamian musicancient Indian music Younes Inc. manufactures industrial components. One of its products, which is used in the construction of industrial air conditioners, is known as P06. Data concerning this product are given below: Per Unit Selling price $ 220 Direct materials $ 38 Direct labor $ 1 Variable manufacturing overhead $ 8 Fixed manufacturing overhead $ 16 Variable selling expense $ 4 Fixed selling and administrative expense $ 16 The above per unit data are based on annual production of 4,000 units of the component. Assume that direct labor is a variable cost. What is the current contribution margin per unit for component P06 based on its selling price of $220 and its annual production of 4,000 units With which of the following countries did Israel find itself at war during the 1950s and 1960s? [Select all that apply.]A-SyriaB-TurkeyC-JordanD-Egypt :) Find the value of x in the isosceles triangle shown below. Facts of G.R NO. 115218 Question 3 of 10What are the domain and range of the function represented by the table?-5051015|-10123O A. Domain: -5 sxs 15Range:{-1,0, 1, 2, 3}O B. Domain: {-5, 0, 5, 10, 15}Range: -1 sys3O C. Domain: {-1,0, 1, 2, 3}Range:{-5, 0, 5, 10, 15}D. Domain:{-5, 0, 5, 10, 15)Range:{-1,0, 1, 2, 3} Which is an example of biopsychology A farmer has a rectangular field with length 1 mile and width 0.5 miles. How much fencing would it take to enclose his field? Find the value of x to the nearest tenth. Can anyone help me solve this?