answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly_w [17]
2 years ago
7

How is the IT function organized in your school or place of employment? Create an organization chart showing how the IT organiza

tion fits into your overall organization. Comment on how centralized or decentralized the IT function is.

Computers and Technology
1 answer:
kkurt [141]2 years ago
6 0

Answer:

A

At my place of employment (which is a knowledge based business) the IT function integrates with all aspect of the operations which include:

  1. top management,
  2. business units,
  3. customers,
  4. non-IT suppliers, and
  5. IT providers.

The IT function manages the entire information technology value chain within the organisation. It provides solutions with regard to the software and hardware IT infrastructure.

We have a locally developed software which forms the frame work upon which our business rests. We refer to this as the Primary Production software. Other software which come preinstalled or post-installed on our machines are referred to as Secondary Production softwares.

All the hardware upon which the Primary and Secondary Production software run on are also managed the the IT Unit.

Every aspect of our operations described above must at somepoint interface or require the expertise of the IT Unit.

Our customers rely on the Primary software.

Business Units must a manager key functions for the Primary software on the backend and rely on secondary production software for other administrative tasks.

B

Please see attached the organisational chart that shows how the above relationships interplay.

C

At our organization, it is critical for the IT function to be centralized.

All decisions are made from the IT unit of the head quarters and cascaded into business units and other IT units at various branch locations.

You might be interested in
Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
xxTIMURxx [149]

Answer:

Python code explained below

Explanation:

f = open(input())

#loading the file, which will serve as the input

s1 = input()  

s2 = input()

lines = f.readlines()

for line in lines:

   line = line.strip(

# strip() removes characters from both left and right

   if s1 <= line <= s2:  #setting the range

       print(line)

f.close()

#closing the file

3 0
2 years ago
Match each logical function with its description. AND COUNTIF SUMIF IF tests for a certain condition and returns one of two valu
lakkis [162]
1. IF
2. AND
3. COUNTIF
4. SUMIF
4 0
2 years ago
Write a method called printRangeOfNumbers that accepts a minimum, maximum numbers as parameters and prints each number from mini
timama [110]

Answer:

The method in python is as follows:

class myClass:

    def printRange(min,max):

         for i in range(min, max+1):

              print("{"+str(i)+"} ", end = '')

           

Explanation:

This line declares the class

class myClass:

This line defines the method

    def printRange(min,max):

This line iterates from min to max

         for i in range(min, max+1):

This line prints the output in its required format

              print("{"+str(i)+"} ", end = '')

5 0
2 years ago
What are threats to computer system
Readme [11.4K]
Theft or vandalism through to natural disasters are physical threats. Non-physical threats target the software and data on the computer systems, Like hackers or just straight up viruses. Also, untrustworthy apps or games can give your computer viruses as well.
3 0
2 years ago
Rupa would like to quickly insert a table into her document without having to worry about formatting the data in the table. Whic
USPshnik [31]
Internet tap and log on application
6 0
2 years ago
Read 2 more answers
Other questions:
  • To read encrypted data, the recipient must decipher it into a readable form. what is the term for this process? re-securing decr
    5·1 answer
  • Joe runs a handyman service. He enjoys writing and keeping up on the latest trends. He wants to share this information with his
    7·1 answer
  • [20 POINTS] Jaime has to configure the dmz network of his organization to the optimum level. Which is the best practice to do so
    7·2 answers
  • Suppose Dave drops a watermelon off a high bridge and lets it fall until it hits the water. If we neglect air resistance, then t
    12·1 answer
  • Consider the following code: x = 17 y = 5 print (x % y) What is output?
    10·1 answer
  • 1.2.2: Output variable value. Jump to level 1 Write a statement that outputs variable userAge. End with a newline. 1 2 3 4 5 6 7
    12·1 answer
  • PC’s &amp; More has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of its cust
    14·1 answer
  • Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
    11·2 answers
  • A Linux systems admin reported a suspicious .py file that ran on a daily schedule after business hours. The file includes shellc
    7·1 answer
  • What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!