1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
9

Explain briefly why it is sometimes necessary to roll software back to a previous version, a procedure called "software

Computers and Technology
1 answer:
Travka [436]3 years ago
7 0

Answer:

If there is some sort of error

Explanation:

If there is an error that is causing problems for clients that needs to be worked out still, rolling back allows customers to still do whatever they need while you look for a solution in the new version.

You might be interested in
A company is inviting design for its new corporate logo from its users. This is an example of ? A. Crowdfunding B. Crowdvoting C
adoni [48]

a crown Source because is beautiful in its own way and it'll be a nice company because you can own the company in a beautiful way now will people wakes blow and now there is not a company that's named the same thing and over and over again

6 0
3 years ago
Read 2 more answers
Wider channel bandwidth ________. increases transmission speed allows more channels to be used in a service band both increases
sattari [20]

Wider channel bandwidth decreases transmission speed.

<h3>What is Wider channel bandwidth?</h3>

Wider WiFi channel widths is known to be a bandwidth that is made up  of 40 MHz and 80 MHz width.

They are known to be used often in the 5 GHz frequency band. In this type pf band, there are said to have a lot of WiFi channels and also less overlapping channels and as such, Wider channel bandwidth decreases transmission speed.

Learn more about bandwidth  from

brainly.com/question/4294318

7 0
2 years ago
Pls help me pass my finals!!​
ale4655 [162]

Answer:

(a): power(2&-2)

The code is as follows:

<em>power = 2**-2</em>

<em>print(power)</em>

<em />

(b): Largest and smallest in a list

The code is as follows:

<em>num = [33,6,11,100,456,109,-4,366]</em>

<em>smallest= min(num)</em>

<em>largest= max(num)</em>

<em>print(smallest)</em>

<em>print(largest)</em>

<em />

(c): Loop in Python

(i) Loop are instructions that are repeated until a certain condition is met;

(ii) For loop, in python are used to iterate over a sequence or through a certain range;

The syntax is:

<em>for loop_element in range(iterating_range):</em>

The following is an illustration of for loop that iterates 5 times

<em>for i in range(5):</em>

Explanation:

(a): power(2&-2)

The ** is used to calculate power.

So, 2**-2 represents 2 raise to power -2

<em>power = 2**-2</em>

This prints the calculated power

<em>print(power)</em>

<em />

(b): Largest and smallest in a list

This initializes the list

<em>num = [33,6,11,100,456,109,-4,366]</em>

This calculates the smallest using min() function

<em>smallest= min(num)</em>

This calculates the largest using max() function

<em>largest= max(num)</em>

This prints the smallest and the largest

<em>print(smallest)</em>

<em>print(largest)</em>

<em />

(c): See answer section

3 0
3 years ago
What are the advantages of using digital signals over analog signals? Scientist have found advantages when they convert digital
Viktor [21]

Answer:

Hope it Helps

Explanation:

Brainliest please

6 0
3 years ago
Read 2 more answers
The term, botnet, means _____________. a. a program that performs a repetitive task on a network b. spam sent via email to sprea
marshall27 [118]

Answer:

c. a group of compromised computers connected to a network that attacks other networks

Explanation:

<em>Botnets </em>refer to a group of computers controlled from a single source in which software programs are run. Botnets can be used for several purposes, such as scientific (SETI), or computing corporate purposes; on the other hand, botnets are also used for illegal purposes, for instance hacker run malicious programs in order to attack other networks.

4 0
4 years ago
Other questions:
  • Samuel is working on decimal and binary conversion for his college project.He is using the binary number 111011 and wants to exp
    8·1 answer
  • Which command will display each line in the text file based on the alphabet?
    10·1 answer
  • What is the answer to this question?
    10·1 answer
  • Nonverbal messages from the movie it​
    5·2 answers
  • Juan copied and pasted information from a Word document
    8·1 answer
  • If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to
    11·1 answer
  • What computer would I need to set up my oculus quest 2 aka make my oculus quest 2 link to a computer?
    7·2 answers
  • Every Java statement ends with: *<br><br> Period<br> Colon<br> Double quote<br> Semicolon
    11·2 answers
  • 5 disadvantage of assembly<br> level language​
    12·1 answer
  • Code a program that gets all possible solutions of a string using 3 for loops. Actual question attached
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!