1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
6

Which of the following best describes a situation where software should be upgraded instead of replaced?

Computers and Technology
1 answer:
ad-work [718]3 years ago
7 0

an OS systems security is at a high risk to hackers so the company can update the OS to improve security

You might be interested in
How ict tools changed the way we live explain it​
laiz [17]

Answer:

How does ICT change our way of living?

ICT has contributed a lot to change our everyday life such as letter to e-mail, market shopping to on-line shopping, classroom learning to e-learning, etc. This paper present's the effects of ICT as Home and Domestic Activities, Social Networking, Education, Health, Commerce, Banking, and Employment.

5 0
2 years ago
hi friends I got the answer down load tutu app from chrome then from tutu app we can download any rare games for ex. Pokemon sun
svlad2 [7]

Answer: Cool!

Explanation: That's sounds amazing!^^

7 0
4 years ago
How do you customize Track Changes in a text document?
lora16 [44]

If its on document u go to text u highlight ur text and then you go upload track changes text on computer or phone or any divice and then you insert the text u wrote to the app and then if u cant find the app look for text changing colors and then copy and past ur work to the app and add the colors to it.

8 0
4 years ago
When inspecting a fire extinguisher: A) The seal should not be broken B) The safety pin should be removed for easier use C) The
dmitriy555 [2]

I believe it’s B, so that you do not accidentally spray out of the hose

8 0
3 years ago
Read 2 more answers
Which network device is capable of blocking network connections that identify as potentially malicious
Katarina [22]
Gateway is the correct answer
6 0
3 years ago
Other questions:
  • When you ____ software, you are adapting it from one type of computer or operating system to run on a different computer or oper
    13·1 answer
  • What nomenclature, commands, procedures are used by the program to define capabilities in the following
    15·1 answer
  • In which of the following careers must one learn and use programming languages?
    12·1 answer
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • Which of the following is NOT contained on the Slide Show toolbar?
    11·2 answers
  • There will be 10 numbers stored contiguously in the computer at location x 7000 . Write a complete LC-3 program, starting at loc
    14·2 answers
  • A veteran had a VA loan using his full entitlement. He allows another veteran to assume the loan without VA approval. Could he i
    6·1 answer
  • What are the steps to view two different versions of the same document at once? 1. Go to the File tab on the ribbon. 2. Select T
    6·1 answer
  • 5.9.5 Fibonacci <br><br> Y’all I’m struggling here do any of you have the code?
    12·1 answer
  • Question 3 of 25 In computer science, what is a developer? A. A person who organizes all the details of a project B. An individu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!