1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
15

What is the full form of bcc please tell​

Computers and Technology
2 answers:
Monica [59]3 years ago
6 0

BCC stands for blind carbon copy.  A carbon copy is a direct copy of a piece of paper.  It is called this because the email is sent to many people, but it is blind because you cannot see the other recipients.

Hope this helps!!

expeople1 [14]3 years ago
3 0

Blind Carbon Copy

For emails. It is used to send a copy of the email to somebody without the original person receiving it knowing that you sent a copy.

You might be interested in
What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis a
juin [17]

Answer:

Basic characteristics of OOAD and compression with SAD can be defined as follows:

Explanation:

The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.  

The features of OOAD can be defined as follows.  

  • The complex issues are simply solved.    
  • The operation of very fast recovery.  
  • The stability in condition changes.
  • Its conceptual method for resolving its extremely complex problems.

The difference in OOAD and SAD can be defined as follows:

  • The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes.  
  • The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.
7 0
3 years ago
A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
babunello [35]

Answer:

Full Record - A screen containing complete or detailed citation information which may include a summary or abstract. Full Text - A term to describe articles that can be displayed in their entirety, as opposed to Abstract and References only.

Explanation:

5 0
3 years ago
Hello pls answer<br><br><br>what is the use of loop in java​
xxMikexx [17]
The use of loop in java is to run a block of code for a certain number of times.
7 0
3 years ago
Nadeen runs a website on vegan lifestyle. She wants to spread the word and make more people visit her site to read her recipes a
pashok25 [27]

What Nadeen needs to do to get people to engage with her web site is to regularly post new content and regularly respond to user comments and questions (options A and C).

<h3>What should Nadeen do to increase visits to her website?</h3>

Currently, social networks and pages have become tools to share information and create a community of people around a topic.

From this trend, many people have developed their own web pages to share their knowledge and experience with other people so that knowledge becomes public and help those who do not have as much knowledge.

However, for a page to have high interactions and visits from the public, the owner of the page must ensure that they comply with some recommendations that will increase the traffic of their page, such as:

  • Post frequently: This is because people are constantly looking for information and like to be up to date with the latest.
  • Respond to user comments and questions: This creates a link between the page owner and their visitors that makes them feel comfortable with this page. This also helps the owner create a community where everyone participates by contributing knowledge.

Note: This question is incomplete because the options are missing. Here are the options:

A. She must post new content on her website regularly.

B. She must increase the number of pay-per-click advertisements on her website.

C. She must regularly respond to user comments and questions.

D. She must use a secure payment gateway.

Learn more about vegan in: brainly.com/question/8708517

3 0
2 years ago
"What is the concept of a computer implemented as part of a larger system that is typically designed around a limited set of spe
FrozenT [24]

Answer: Embedded system

Explanation:The combination of the hardware system along with software system to perform a particular function or task is known as the embedded system. It is a specific performance device which does its working on the basis of the microcontrollers as well as microprocessors .It performs the task according to the programs that are invoked in it to do the task in a larger device.

Example:- Printers performs specific task of printing and scanning

7 0
3 years ago
Other questions:
  • The benefits of flextime include:
    11·2 answers
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • Working for the Internal Revenue Service is a career in public safety. A. True B. False
    14·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • Which of the following provides services to hosts on its network?
    9·1 answer
  • What is DATE data type and its syntax and what is TIMESTAMP data type and its syntax in SQL language.Explain the difference betw
    14·1 answer
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • 1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
    5·1 answer
  • For how long should a media piece hold the user's attention?
    13·2 answers
  • How would you explain how a password generator program works
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!