1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren [92.7K]
3 years ago
13

When you ____ software, you are adapting it from one type of computer or operating system to run on a different computer or oper

ating system?
Computers and Technology
1 answer:
ra1l [238]3 years ago
7 0

Answer: Port

Explanation :

When we port a software from one computer to another computer or from one operating system to another operating system, it tries to adapt to the new environment of the machine by checking the required the configurations of the machine and then checking the available files in the software to run the machine.

The porting of a software also checks whether the software is compatible with the machine or not and if not then why.

You might be interested in
Case Project 2-1: The Differences Between IPv4 and IPv6 You are a network engineer for an IT consulting firm named F1IT. One of
Nadusha1986 [10]

Answer:

Following are the difference to this question:

Explanation:

IPv4:

The IPv_4 is uses the packet changed method, that is a Link Layer networks(like Ethernet).  It has 4.3 billion addresses capacity. It uses the 32-bit logical device address, that written in decimal language. It is divided by 4 bytes E.g. 192.168.1.1  

The host part and network part are 2 parts. For a network, the host part may vary, while for the entire subnet, the network part remains equal. The scheme of 232 addresses is available on application depends on security.

IPv6:

The IPv6 is used in the internet protocoland it is higher than IPv4. It can provide endless number Opf addresses, and use to solves the problem of IPv4 exhaustion and satisfies  the demand for rising networking.

IPv4 Substitutor Built to meet more IP address requirements. In the Logical address of 128-bit Written hexadecimally and with colons divided, and the Space of 128 addresses are required. IPsec is an integrated security feature.

5 0
3 years ago
A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one child cl
Troyanec [42]

Answer:

The answer is A)

Explanation:

In programming languages like java you can only use single inhertance meaning a class can only inherit attributes from one class. But in other languanges like C you can have multiple inhertance

6 0
3 years ago
It is the student’s responsibility to meet the expectations identified by a rubric.
Alja [10]

Answer:

True

Explanation:

6 0
3 years ago
Read 2 more answers
Products in which titanium is used
Lynna [10]

Answer:

It is used in jewelry, tennis rackets, scissors, bicycle frames, surgical tools, mobile phones and some other high-performance products.

Explanation:

Titanium is a familiar metal. Titanium is as strong as steel but weights about half as much.

6 0
3 years ago
Read 2 more answers
What's an e-mail server? An e-mail server is the computer to which the e-mail message is sent. An e-mail server is the e-mailing
umka2103 [35]

Answer:

An e-mail server is a specialized computer that stores, processes, and sends e-mails is the correct answer.

Explanation:

An email server is also called a mail transfer agent is a program that is responsible for delivering, storing and receiving the email by following standard email rules.

Types of Email server:

  • Outgoing mail servers.
  • Incoming mail servers.

The main purpose of the e-mail server is to stores the incoming mail and sends outgoing mails.

8 0
3 years ago
Other questions:
  • What is an embedded system. Give examples
    12·1 answer
  • __________ has led to the belief that the Internet is "free".
    8·1 answer
  • Which browser do most web users use and why do you think that it is that way? Make sure you search online for statistics to conf
    5·1 answer
  • The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli
    11·1 answer
  • __________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
    9·1 answer
  • To print the last element in the array named ar, you can write :A. System.out.println(ar.length);
    13·1 answer
  • Industry experts estimate about what percentage of communication is through body language?
    11·2 answers
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
  • ¿Toda sustancia de aspecto homogéneo es siempre una sustancia pura?
    8·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!