1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
2 years ago
10

What is the full form of BD in computer​

Computers and Technology
2 answers:
fenix001 [56]2 years ago
8 0

Answer:

I hope this answers help you

Explanation:

Bd fullform in computer is Blu-ray disc

grin007 [14]2 years ago
7 0

Answer:

the full form of BD binary digits

You might be interested in
A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
Alexus [3.1K]

Answer: True

Explanation:

 Yes, the given statement is true that the DBA (Database administrator) utilize particular programming to store and arrange information.

The DBA is the proper understanding of the comprehension of the key business of an association, be capable in the utilization of chose database the executives frameworks, and remain side by side of developing advancements and new plan draws near.

The main purpose of the database administrator that it incorporate scope organization, establishment, setup, database plan, movement, execution checking, security, investigating, just as reinforcement and information recovery.

8 0
4 years ago
I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
gogolik [260]

I'm better then u in brawhlla

5 0
3 years ago
What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit
olchik [2.2K]

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

6 0
3 years ago
ead the spreadsheet formula below, then answer the question. =SUM(C6:C9) What does the : symbol in the formula do? arranges the
melamori03 [73]
Selects all the cells in the range c6 to c9
3 0
3 years ago
The 3 parts of the CPU are
katrin2010 [14]

Central Processing Unit

Arithmitic Logic Unit

Control Unit


3 0
4 years ago
Read 2 more answers
Other questions:
  • Open Source software is:
    6·1 answer
  • Prove, using mathematical induction, that the given property of the Fibonacci numbers is true [F(n+1)]2 =[F(n)]2+F(n−1)∗F(n+2) f
    5·1 answer
  • What would you use to exit from a for each activity and continue the execution of the workflow?
    13·1 answer
  • Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
    9·1 answer
  • Once you record your audio and click ok to save it what happens to the recording?
    9·1 answer
  • Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy ser
    10·1 answer
  • As designs incorporate new technologies, it can seem like an actor is walking through a projection or even become part of a proj
    10·1 answer
  • To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
    7·1 answer
  • Suppose the daytime processing load consists of 65% CPU activity and 35% disk activity. Your customers are complaining that the
    15·1 answer
  • output device is any peripheral to provide data and control signal to ab information processing system​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!