1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
8

Write the full forms of the following:

Computers and Technology
1 answer:
Grace [21]3 years ago
5 0

Answer:

The abbreviation of the given points is described below.

Explanation:

  • GIGO stands for "Garbage In/Garbage Out".
  • MHz stands for "Megahertz".
  • BBS stands for "Bulletin Board System".
  • CBT stands for "Computer-based training".
  • KB stands for "Knowledge Base".
  • ICU stands for "Intensive Care Unit".
  • CAI stands for "Common Air Interface".
  • WBT stands for "Web-based training".
  • IPM stands for "Intel Power Monitor".
  • CAS stands for "Channel Associated Signaling" and "Customer Alert Signal".
  • ICT stands for "Information and Communication Technology".
  • ATM stands for "Automatic Teller Machine".
You might be interested in
Rebecca received the following e-mail from her boss: I NEED ALL EMPLOYEES TO WORK LATE ON SATURDAY. NO EXCEPTIONS! What is the m
elena-s [515]
Well for one it's in caps so it makes it seem like he's angry and also kinda rude how it doesn't message all of them separately asking who can and can't come into work, saying he needs as many people as possible. Not only that but he says no exceptions which seems greedy and inconsiderate.
4 0
3 years ago
Read 2 more answers
____ are programs that need to be attached to other files to install themselves on computers without the users’ knowledge or per
lakkis [162]

Answer: Computer viruses

Explanation:

Computer viruses are programs that need to be attached to other files to install themselves on computers without the users’ knowledge or permission and spread—sometimes very rapidly. A spyware is also a program that installs itself on a computer without the user's knowledge and tries to collect sensitive information such as passwords, credit card details and sends this information to a remote computer. A computer worm is a type of a virus that replicates itself across different computers. Freeware on the other hand is software that can be obtained for free.

6 0
3 years ago
What is a column in a table
serious [3.7K]

Answer: The columns in a table are the set of facts that we keep track of about that type of object.

Explanation:

5 0
3 years ago
Read 2 more answers
How fast can the winds blow in a tornado?
sp2606 [1]
Over 200 mph generally now I says 300 mph
6 0
3 years ago
Read 2 more answers
Intro to cs 3.7 edhesive g=float(input("Enter your English test grade:")) if(g<=64): print("F") if (g>=65 and g<69): pr
qwelly [4]

Answer:

The correct code for this question:

g=float(input("Enter your English test grade:")) #take input from user.

#check conditions

if (g>=100 and g<=90):

print ("A")

#g greater then equal to 100 and less then equal to 90.

if (g>=89 and g<=80):

print("B")

#g greater then equal to 89 and less then equal to 80.

if (g>=79 and g<=70):

print("C")

#g greater then equal to 79 and less then equal to 70.

if (g>=69 and g<=65):

print("D")

#g greater then equal to 69 and less then equal to 69.

if(g<=64):

print("F")

#g less then equal to 64.

else:

print ("Not a grade")

#not a grade or fail.

Explanation:

In this program, we use to take a value from the user and check the value from the various conditions. To check all the condition we use if-else statement and AND operator that check to the range to together.

If -else is a conditional operator. In that, If block is used to check the true part and else part takes false value, and AND is a logical operator that check the two range together  

5 0
3 years ago
Other questions:
  • A geologist is part of what career feild
    6·1 answer
  • A word processing program would probably be used to: 
    8·1 answer
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • How much days are in a year
    9·2 answers
  • In ancient times what did kings and tribals chiefs use to communicate
    10·1 answer
  • Consider the following program segment: //include statement(s) //using namespace statement int main() { //variable declaration /
    9·1 answer
  • Code: ckg-jbqp-hki<br>only girls join❤️​
    11·2 answers
  • What is the initial step to exploring solutions to a problem?
    15·2 answers
  • ____ uses a computer to design and test new products and modify existing ones. Computer-aided manufacturing Just-in-time design
    8·1 answer
  • 5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!