Computers and Technology

PLS HELP ASAP Henry has created a software product that manages a database of company clients. He wants to Install the software on a client's computer, which has an operating system that does not support the software. What can Henry do to run the software on the client's computer? ОА. rewrite the program code to change the software's function O B. run the software on a virtual version of the supported operating system OC. upgrade the client's operating system to run that version of the software OD. install a fresh copy of the supported operating system on the client's computer

a. rewrite the program code to change the softwares function

b. run the software on a virtual version of the supported operating system

c. upgrade the clients operating system to run that version of the software

d. install a fresh copy of the supported operating system on the clients computer ​

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 06:30, scoutbuffy2512
On early television stations, what typically filled the screen from around 11pm until 6am? test dummies test patterns tests testing colors
Answers: 1
image
Computers and Technology, 23.06.2019 17:00, chrisgaz14
The more powerful, 60 volt cables and the main power shut off on an hev are both colored orange
Answers: 1
image
Computers and Technology, 24.06.2019 16:30, laureanogabriel
What is the item which could be matched with a statement below? software installed on a computer that produces pop-up ads using your browser an example of social engineering malware loads itself before the os boot is complete type of spyware that tracks your keystrokes, including passwords windows key + l the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer when someone who is unauthorized follows the employee through a secured entrance to a room or building a type of malware that tricks you into opening it by substituting itself for a legitimate program a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Answers: 1
image
Computers and Technology, 25.06.2019 05:30, pooperjooper
Website hosting servers have their own unique ip address, what does this address consist of? a. numbers and letters b. numbers c. letters d. letters and symbols
Answers: 2
Do you know the correct answer?
PLS HELP ASAP Henry has created a software product that manages a database of company clients. He w...

Questions in other subjects:

Konu
Mathematics, 18.12.2020 18:00
Konu
Mathematics, 18.12.2020 18:00
Konu
Advanced Placement (AP), 18.12.2020 18:00
Konu
Advanced Placement (AP), 18.12.2020 18:00
Konu
English, 18.12.2020 18:00