1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
6

Which of the following best describes a situation where software should be upgraded instead of replaced?

Computers and Technology
1 answer:
ad-work [718]3 years ago
7 0

an OS systems security is at a high risk to hackers so the company can update the OS to improve security

You might be interested in
How to play music out of your apple watch?
Travka [436]
It does not work that way....I thought the same thing. The sound will always come out of your iPhone
6 0
3 years ago
What udp port is used for i k e traffic from vpn client to server?
Reil [10]
<span>Ports are used to distinguish among multiple destination processes in a single host computer.</span>
UDP (User Datagram Protocol)<span> port 500 is used for i k e traffic from VPN client to server.
</span><span>This port is used during the establishment of secure VPN tunnels.
</span>
6 0
3 years ago
Whoever wants to join me in The Sims (mobile), my friend code is:<br> EPQL3E9<br> Come join me!
BigorU [14]
BET LOLOLOL SEE YA THERE
7 0
2 years ago
Read 2 more answers
What is the final value for X ?<br><br> x= 1<br><br> x=13<br><br> x= x+3<br><br> x=0
a_sh-v [17]

Answer:

x=13

Explanation:

6 0
3 years ago
What type of activities are performed with the help of the software used in hospitals?
faust18 [17]

Answer:

Xrays, Ultrasounds, managing patient records, communicating with colleagues, etc.

7 0
2 years ago
Read 2 more answers
Other questions:
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    7·1 answer
  • Which of the following describes the difference in light intensity between the brightest white and the darkest black that can be
    15·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • When you align or size a group of selected controls, the changes are made relative to the
    14·1 answer
  • __________ use a challenge response mechanism in which a server challenges a user with a number, which a user must then enter in
    5·1 answer
  • Portable Document Format (PDF) is a file format that provides an electronic image of a document and can be viewed, printed, and
    12·2 answers
  • What type of error results from an error in the formatting of the program code?
    13·1 answer
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • Who is tim berners-lee
    14·2 answers
  • A serial schedule:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!