1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
3 years ago
9

What type of software repairs or improves a larger application that is already installed on a system?

Computers and Technology
2 answers:
earnstyle [38]3 years ago
7 0

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
pishuonlain [190]3 years ago
7 0

Answer:

\:  \:  \:

Mapping

You might be interested in
What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
Blizzard [7]

Answer:

Input

Processing

Output

Explanation:

6 0
3 years ago
How is information sent across the internet binary
Annette [7]

Answer:

Binary information must be encoded in some way before transmission over the Internet. ... Copper wire is used to transmit binary messages using electricity - a voltage on the wire means one state, and no voltage means the other. Fiber-optic cables, on the other hand, use light (on or off) to transmit a binary message.

8 0
3 years ago
Which of the following is the first step in the boot process? Select one: A. The BIOS checks that all devices are operational. B
dalvyx [7]

Answer:

D. The BIOS is activated by powering on the CPU.

Explanation:

The BIOS is activated by powering on the CPU is the first step in the boot process.

5 0
3 years ago
What project started the development of inter-network connections using tcp/ip that has evolved into the internet today.?
rosijanka [135]
Dial Up, help start it
3 0
3 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Other questions:
  • Write a program for Horizon Phones, a provider of cellular phone service. Prompt a user for maximum monthly values for talk minu
    6·1 answer
  • Help me out for this one
    12·1 answer
  • Convert to binary140
    5·1 answer
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • An algorithm written out in plain English statements is called __________.
    8·1 answer
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • When you login to your blogging account. The first screen with all controls, tools and functions is called .... Select one: a. D
    10·1 answer
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
  • I have the requirements for Ace rank on Brainly but hasn't given me it yet. Does it just take longer than normal ranks or someth
    15·2 answers
  • Customer history is an example of what
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!