______________ covers the entire amount of operations which exploit Information Technology for improving efficiency of an organization.
(A) File Transfer Protocol
(B) Hyper Text Transfer Protocol
(C) Internet Message Access Protocol
(D) IT Enabled Services