1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
8

Write the full forms of the following:

Computers and Technology
1 answer:
Grace [21]3 years ago
5 0

Answer:

The abbreviation of the given points is described below.

Explanation:

  • GIGO stands for "Garbage In/Garbage Out".
  • MHz stands for "Megahertz".
  • BBS stands for "Bulletin Board System".
  • CBT stands for "Computer-based training".
  • KB stands for "Knowledge Base".
  • ICU stands for "Intensive Care Unit".
  • CAI stands for "Common Air Interface".
  • WBT stands for "Web-based training".
  • IPM stands for "Intel Power Monitor".
  • CAS stands for "Channel Associated Signaling" and "Customer Alert Signal".
  • ICT stands for "Information and Communication Technology".
  • ATM stands for "Automatic Teller Machine".
You might be interested in
1. What does the term 'in season' mean?
yKpoI14uk [10]
Available at the time of year.
8 0
3 years ago
Read 2 more answers
What is outlook used for?
Arte-miy333 [17]
Outlook is used for mainly emails. It also keeps track of your calendar, has contact and tasks.
4 0
3 years ago
Read 2 more answers
Select the correct answer. Hudson has to maintain confidential college data in a spreadsheet. He needs two team members to help
AlladinOne [14]

Answer:

B. Protection

Explanation:

It is the protection tab. We can protect a cell from being changed or altered by any other user of the excel sheet using the protection tab. We only need to select the cell, and right-click, Now choose the protection tab, which will be shown. And now select locked and click ok. This cell cannot then be changed by anyone else other than you. Hence, the correct option here is the protection tab.

4 0
3 years ago
If you want a user to enter exactly 20 values which loop would be the best to use
miskamm [114]
The answer to this is 'for'
3 0
3 years ago
____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
Volgvan
Pretty sure answer is <span>E-mail spam</span>
4 0
3 years ago
Other questions:
  • Which is a real-world example of a procedure?
    11·1 answer
  • Please answer this I know that no one else does but I can't think right now
    10·1 answer
  • How are IP addresses usually written?
    7·1 answer
  • Why can't I register for Brainly?? I've been trying for months, too! I've noticed this question has been asked so many times, bu
    7·1 answer
  • PLEASEEEEE HELLPPP IT'S URGENT!!! PLEASEEEEE HELLPPP IT'S URGENT!!!
    5·1 answer
  • Ask how many apples the user wants. Ask how many people the user will share the apples with. Find out how many apples will remai
    7·1 answer
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • CSNET Stand for in a computer
    11·1 answer
  • Which wireless standard runs on both the 2.4 and 5 GHz frequencies?
    11·1 answer
  • An end-user license agreement protects _____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!