1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
2 years ago
9

What type of software repairs or improves a larger application that is already installed on a system?

Computers and Technology
2 answers:
earnstyle [38]2 years ago
7 0

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
pishuonlain [190]2 years ago
7 0

Answer:

\:  \:  \:

Mapping

You might be interested in
Most c++ compilers check whether indices are within the range determined by an array's declaration. true false
attashe74 [19]

I’d say True

In C++ syntax, it is correct to exceed the valid range of indices for an array. However, this can cause problems like errors on compilation and runtime. Use of Brackets [] in C++ have a close relationship with arrays. They specify the size of arrays when they are declared. They also specify indices for concrete array elements when they are accessed.  


6 0
2 years ago
WILL GIVE BRAINLIEST!! 20 PNTS!!!
Anettt [7]

Answer:

C 1,2,3,4

Explanation:

This means I want to count from 0-4 and set it o the current loop I am currently on.

for i in range(0, 5):

 print("i currently equals: ", i)

The result will be

i currently equals: 0

i currently equals: 1

i currently equals: 2

i currently equals: 3

i currently equals: 4

8 0
2 years ago
Read 2 more answers
To make an exact copy of an existing slide, from the new slide gallery
Anuta_ua [19.1K]
If you're talking about Microsoft PowerPoint, just go to the slide view, right click and click "Duplicate Slide".

I'm sure you can also Copy and Paste slides. 
3 0
3 years ago
A confidential number used as an authentication factor to verify a user’s identity is called a:
damaskus [11]

Answer: (A) PIN

Explanation:

 PIN is the personal identification number which is basically used to verify the identity of the users. It is confidential number which is used as the authenticating factor.

The PIN is the combination of the number that is also use to authenticate the banking system with the users.

On the other hand, the other given options are incorrect because these are not used to identify the users identification process.

Therefore, Option (A) is correct.

8 0
3 years ago
With segmentation, a logical address consists of _____.
Dovator [93]
I dont under stand the question 
8 0
3 years ago
Other questions:
  • Fill in the blank - A generation of social-oriented, physical games such as the _______ Wii console, emerged in the late 2000s,
    15·1 answer
  • Supplementary content SC is usually an important part of a webpage (but is not required for a page to receive a high or even hig
    7·1 answer
  • The process of engineering design typically starts with what ?
    12·1 answer
  • You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLA
    15·1 answer
  • A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
    13·1 answer
  • What number will be output by the console.log command on line 5?
    8·1 answer
  • Match the following.
    8·1 answer
  • Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts.
    9·1 answer
  • What is the answer???​
    6·1 answer
  • ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!