1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
4 years ago
15

Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to

20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?
Computers and Technology
2 answers:
Oliga [24]4 years ago
6 0

Answer:

The correct answer is: Back-Out Plan.

Explanation:

To begin with, the term of back-out plan in the field of computers refers to the situation where a person wants to <u><em>restore a system to its original or previous state</em></u> in the case where there is a failure trying to implent a new system. Moreover,  this back-out plan works as an action process where once the failure has happened then the system will <u><em>intiate a series of procedures to uninstall or disintegrate the system that had the failure</em></u>. It basically defines a contingency plan component of the IT service management framework.

Secondly, in the case presented where a person must decide what document he should address to resolve the problem then a back-out plan will be the most common response given the fact that it will quickly uninstall the new software that was not compatible with the old data fields and help the users to open their files without problems and later seek for a new way to install that new software.

olga55 [171]4 years ago
3 0

Answer:

Back-out plan documents

Explanation:

When upgrading servers or installing new softwares on servers, Back-out plan document is created so that in case if any issue occur because of this change then the system can be reverted back to the previous working state. Back-out plan documents is very useful document in crisis situation.

You might be interested in
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
What is a device driver​
sleet_krkn [62]

Answer:

Explanation:

In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer. ...

4 0
3 years ago
Read 2 more answers
As a technical project​ manager, you have decided to propose implementing a prototyping methodology for a small​ web-based desig
Arlecino [84]

Answer:

B: Use the prototype and revise and enhance the prototype.

Explanation:

Before going ahead to execute any project, one must define the requirements for the project. It is only after the requirements for the project is known that one can go ahead to develop the prototype, use the prototype, revise and then enhance the prototype.

4 0
4 years ago
What is the default zoom percentage in Word?<br><br> 50%<br> 100%<br> 150%<br> 200%
Hunter-Best [27]

Answer:

its 100%

Explanation:

5 0
3 years ago
Read 2 more answers
Which media player is designed to transfer media to an iOS device?
zubka84 [21]
C. Itunes.
In Apple devices, the iTunes if the only application may it be Windows or OSX operating system iTunes is the only official app registered by apple to stream via cable or wifi to the devices like iPhone, iPad and other Apple devices.

A. Streaming
Slightly the same with downloading but stream makes it self available as it download its content over the internet.
8 0
4 years ago
Other questions:
  • Which sentence best describes an activity stream?
    10·2 answers
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the netwo
    9·1 answer
  • Which type of network topology connects multiple devices to a central device?
    7·1 answer
  • The process of providing and denying access to objects is called:
    5·1 answer
  • . In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and eas
    10·1 answer
  • Omega Software Inc. is currently running a training program for employees to upgrade their software skills so that they are able
    10·1 answer
  • Write a function MaxMagnitude with two input parameters, that returns the largest-magnitude value. If the inputs are 5 7, the fu
    14·1 answer
  • Which of the following types of operating systems does Windows® belong to?
    15·1 answer
  • Relieved to have survived ,henry rolled off the rink________.giving alex a grateful look
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!