1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
1 year ago
11

what occurs when the software vendor releases a new version of the software making significant changes to the program?

Computers and Technology
1 answer:
Ludmilka [50]1 year ago
7 0

When the software vendor releases a new version of the software making significant changes to the program, then the software upgrades.

What is software vendor?

A software vendor (ISV), often known as a software publisher, is a company that focuses on creating and selling software rather than computer hardware for broad or specialised markets. In contrast, in-house software is created by the organisation that will utilise it, whereas custom software is created or tailored for a single, particular third party. Although ISV-provided software is used by end users, it remains the vendor's property. ISV-created software can be used for a wide range of purposes. Software for real estate brokers, healthcare personnel scheduling, barcode scanning, stock maintenance, gaming, commerce, energy exploration, vehicle fleet management, and child care management software are some examples.

To learn more about software vendor

brainly.com/question/14294449

#SPJ4

You might be interested in
How do i block somebody on here, theyre making me have a panic attack. /srs
spin [16.1K]

Answer:

If someone is disturbing you a lo then you can report him/her.

  • Go to g-mail.
  • Type a message to US Support.
  • Add a screenshot of him/her whom you want to report.
  • Use polite words
  • At last, send it.

You will get soon response.

5 0
3 years ago
Read 2 more answers
Which of the following BEST describes a front-end developer?
Zina [86]

Answer:

plz give me BRAINLIEST answer

Explanation:

Definition: Front end development manages everything that users visually see first in their browser or application. Front end developers are responsible for the look and feel of a site. ... As a front end developer you are responsible for the look, feel and ultimately design of the site.

4 0
3 years ago
Read 2 more answers
Importance of animal husbandry for human society​
Vedmedyk [2.9K]

Answer:

Animal husbandry currently focuses on health, reproduction, and security. We have built efficient and hygienic systems, which have been optimized commercially for production.

Explanation:

6 0
3 years ago
Tristen is teaching her history course. She printed off her presentation so the students could take notes. Wyatt is
sveta [45]

Since Tristen want her students to take notes on her presentations, she should have some sort of handout.

Because Wyatt, wants to ensure that students who do not have PowerPoint can still view his presentations, converting it into a pdf is best.

Since Reed's students are very visual, converting his slides into a video will make it better for students who want to spend some time assessing some of the graphs or equations.

Thus, A is the best choice.

6 0
3 years ago
Read 2 more answers
What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It
makvit [3.9K]

Solution:

A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.

DDoS attacks have been carried out by diverse threat actors, ranging from individual criminal hackers to organized crime rings and government agencies. In certain situations, often ones related to poor coding, missing patches or generally unstable systems, even legitimate requests to target systems can result in DDoS-like results.

It works as:

In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master system identifies other vulnerable systems and gains control over them by either infecting the systems with malware or through bypassing the authentication controls (i.e., guessing the default password on a widely used system or device).

A computer or networked device under the control of an intruder is known as a zombie, or bot. The attacker creates what is called a command-and-control server to command the network of bots, also called a botnet. The person in control of a botnet is sometimes referred to as the bot master.

Botnets can be comprised of almost any number of bots; botnets with tens or hundreds of thousands of nodes have become increasingly common, and there may not be an upper limit to their size. Once the botnet is assembled, the attacker can use the traffic generated by the compromised devices to flood the target domain and knock it offline.


8 0
3 years ago
Other questions:
  • Text filters allow you to create a custom filter to match ________ the text in a field that you specify.
    7·1 answer
  • Gabe just won the lottery after ten years of consistently buying a ticket every Friday. Based on his initial reaction of feeling
    14·2 answers
  • What does UDP stand for?
    12·2 answers
  • Gross Domestic Product (GDP) is the economic report card for any country. What is the report card measuring?
    6·1 answer
  • PLEASE HELP ME! How should you behave in an online academic environment? Check all that apply. Keep messages brief Respect the c
    13·2 answers
  • A large electronic game manufacturer decides to establish a customer service center in Lahore, Pakistan. This is an example of _
    10·1 answer
  • Time-management techniques work most effectively when performed in which order?
    7·1 answer
  • ILL GIVE BRAINLIEST TO FIRST ANSWER David is adopting an iOS app from a non-retina screen to a retina screen. The app currently
    13·1 answer
  • 5. In which of the following stages of the data mining process is data transformed to
    9·1 answer
  • When you get a new sim card do it come with a new number or do you have a activate the phone and get a new number in store ?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!