1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
4 years ago
9

What is one step taken when solving a computer software problem?

Computers and Technology
1 answer:
alexandr1967 [171]4 years ago
3 0
Scanning the computer and deleting any viruses

[ if this helped you please give brainliest :) ]
You might be interested in
Formatting can be applied to
valkas [14]
Formatting can maybe be applied to software works
8 0
3 years ago
Read 2 more answers
How do you change between worksheets inside an excel workbook?
pochemuha
The correct answer is A
8 0
3 years ago
Read 2 more answers
What does the Sort feature do with a database
WARRIOR [948]
Nothing. If you SELECT data from a database, and add an ORDER BY clause, it just affects the ordering of the data that is returned to the user, but the data in the database remains unaltered.
6 0
4 years ago
The bantu and arabic languages blended, creating what new language?
Anon25 [30]
The answer is swahili

Basically, the Swahili language is of an African Bantu origin with borrowed words from other languages like Arabic. It dates back to the interactions between the Arabian traders and the inhabitants of the east coast of Africa. The language was often thought to be an interaction between Bantus and Arabs. Arab cultures had a huge influence on the Swahili language.




5 0
4 years ago
Read 2 more answers
What functionality can a vulnerability scanner provide that a port scanner cannot?
Rina8888 [55]
<span>Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
</span>port scanner<span> allows testing of open </span>ports and firewalls. It d<span>iscovers open UDP </span>ports<span> on your target system by </span>scanning with NMAP and by doing so it is<span> the first step of a complete </span>vulnerability<span> assessment. </span>
7 0
3 years ago
Other questions:
  • A*+(B+c|3) how do you figure out the coding for this
    14·1 answer
  • What does ACCU stand for?
    13·2 answers
  • What is true about using the reserved word super?
    9·1 answer
  • How do you represent the decimal integer 50 in binary?
    14·1 answer
  • Easy 25 points answer what is it called that you use only 1 and 0 like this 1010010011001100011110001010010101001010101010010101
    5·1 answer
  • Jamie is preparing a presentation on his laptop for his college annual event. He inserts audio and video files into the presenta
    11·2 answers
  • Write an algorithm that gets as input your current credit card balance, the total dollar amount of new purchases, and the total
    8·1 answer
  • If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or
    11·1 answer
  • Autocad has _____ different ways to use the three point method if drawing and arc
    8·1 answer
  • HELLO. Which of the following is NOT a way to control the flow of a program?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!