1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
15

Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to

20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?
Computers and Technology
2 answers:
Oliga [24]3 years ago
6 0

Answer:

The correct answer is: Back-Out Plan.

Explanation:

To begin with, the term of back-out plan in the field of computers refers to the situation where a person wants to <u><em>restore a system to its original or previous state</em></u> in the case where there is a failure trying to implent a new system. Moreover,  this back-out plan works as an action process where once the failure has happened then the system will <u><em>intiate a series of procedures to uninstall or disintegrate the system that had the failure</em></u>. It basically defines a contingency plan component of the IT service management framework.

Secondly, in the case presented where a person must decide what document he should address to resolve the problem then a back-out plan will be the most common response given the fact that it will quickly uninstall the new software that was not compatible with the old data fields and help the users to open their files without problems and later seek for a new way to install that new software.

olga55 [171]3 years ago
3 0

Answer:

Back-out plan documents

Explanation:

When upgrading servers or installing new softwares on servers, Back-out plan document is created so that in case if any issue occur because of this change then the system can be reverted back to the previous working state. Back-out plan documents is very useful document in crisis situation.

You might be interested in
Full from of tmc computer
Butoxors [25]

Answer:

Traffic Message Channel,

7 0
2 years ago
Read 2 more answers
What responds to both visual appeal and functional needs? (1 point) A.) applied art B.) performance art C.) fine art D.) visual
d1i1m1o1n [39]

Answer:

a

Explanation:

6 0
3 years ago
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
2 years ago
The what toolbar can be customized to the preferences of the user
schepotkina [342]
Is this a multiple choice question?
7 0
3 years ago
Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
ryzh [129]

Answer:

c. decDiscount = GetDiscount(decSales, decRate)                                                                                                                          

Explanation:

Option a. is incorrect because it is using Call word which is not a valid way to invoke a function.

Similarly option b. is also incorrect because it uses Call word to invoke function GetDiscount() which is not a valid way to call a function and also it is passing it the contents of three variables decSales, decRate and decDiscount and as mentioned in the question only two parameters are to be passed to GetDiscount() function.

Option c. is correct as it invokes the function GetDiscount() and passes it the contents of two variables decSales and decRate and assigns this to a variable decDiscount. For example if the GetDiscount() method has to calculate the discount using decSales and decRate then the resultant value of this computation is assigned to decDiscount. So whatever this function returns or computers is assigned to and stored in decDiscount variable. So this is a valid way to invoke a method.

3 0
2 years ago
Other questions:
  • A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,
    10·2 answers
  • what is the primary way to access applications in windows 8? a. control panel b. start menu c. desktop tiles d. context menu
    7·1 answer
  • What power brake uses vacuum from the engine to aid in brake application?
    6·2 answers
  • Satellite images are based on data obtained by ____________ (gps/landsat) satellites.
    5·1 answer
  • Explain the role of a computer in education​
    9·1 answer
  • Complete the sentence.<br> The IP protocol creates and addresses packets at the _____ layer.
    7·2 answers
  • Read the following scenario what type of business letter do you think is required in this situation?
    12·2 answers
  • Suppose cell C5 contains the formula =B$6+C1.
    6·1 answer
  • Please help with question
    14·1 answer
  • You discover that the lecturers will be using the laptops for online and video lecturing, and you see the need to upgrade the RA
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!