1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
15

Henry has created a software that manages a database of all the clients of his firm. He wishes to run the software on another co

mputer system that runs an operating system that does not support the software. What can he do to run the software on the other operating system?
Computers and Technology
2 answers:
vlada-n [284]3 years ago
8 0
That you need to upgrade your computer if you are gonna install a software and who knows what kind of software it is some computers don't handle all softwares. <span />
Bezzdna [24]3 years ago
5 0
Upgrade to the latest operating system that supports the software. Leave a thanks for support. Much appreciated
You might be interested in
Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consis
Helga [31]

Answer:

Explanation:

The language I use would do it as

h1$ = copy(h$,1,3)

This may not satisfy you, because your language could be quite different. You might want an input statement of some kind that would define h$. This assumes that somewhere h,h1 are declared as  strings.

You also have to know how to read an input. My language uses readln(input,h)

and how to write it on the screen write(h1) or writeln(h1)

6 0
3 years ago
Joe is a florist and wants to increase his client base. How can he achieve this with the help of a computer?
madam [21]
A because sounds like the correct answer
8 0
3 years ago
Read 2 more answers
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another compu
svetoff [14.1K]

Answer:

B)tracert

Explanation:

Tracery Command can be regarded as

network diagnostic tool, it is used in tracking process of pathway of packet ranging from source to destination on IP network. It as well allows to know real time of each hops that are been taken by a packet as it enroutes to it's destination. The traceroute can be run by following these steps:

✓Open the run window

✓Open Command prompt, this can be done by enter "cmd" then enter.

✓ input" tracert" then destination ( Ip address or web address)

It should be noted that Tracery command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer.

6 0
3 years ago
Which statement describes a disadvantage of e-government?
kicyunya [14]

Answer:

Setting up and maintaining the online systems can be expensive

Explanation:

4 0
4 years ago
3. Which of the following is the best definition of a workplace policy?
Oksi-84 [34.3K]

The best definition of a workplace policy is: d. the standard course of action adopted by a business.

Workplace policies are a company’s standard rules of what should and should not be done by its workforce. These policies are strictly enforced as the workforce’s actions reflects the company. Failure to comply with these policies may lead to a member of the workforce’s removal from the business.

6 0
4 years ago
Other questions:
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • Which fingers do you use to type the following letters rtgvf
    11·1 answer
  • Can embedded computers automate security so you can lock and unlock doors remotely
    15·1 answer
  • Nine and 2 hundred thirty-five thousandths has a decimal
    5·2 answers
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
  • Can i have help for a ggogle class room
    14·1 answer
  • Not all output display data for humans to read explain why​
    13·1 answer
  • I need help here thanks forever who helps
    7·1 answer
  • Discusse five advantages of utilising DBMS over a file based system
    8·1 answer
  • All of the following are personal security safeguards except ________. Select one: A. send no valuable data via email B. Use htt
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!