1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
4 years ago
14

What is the full form of ICT?​

Computers and Technology
2 answers:
aleksandr82 [10.1K]4 years ago
5 0

Answer:

<h2>Information and communication technology</h2><h2 />

<em>hope</em><em> </em><em>this</em><em> </em><em>helps</em>

<em>brainliest</em><em> </em><em>appreciated</em>

<em>good</em><em> </em><em>luck</em><em>!</em><em> </em><em>have</em><em> </em><em>a</em><em> </em><em>nice</em><em> </em><em>day</em><em>!</em>

dalvyx [7]4 years ago
3 0
Information and communications technology
You might be interested in
identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
kompoz [17]

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

8 0
4 years ago
How is the phrase "employability skills" defined?
Digiron [165]

Answer:

Problem-solving. Why is problem-solving so valued? Companies face a lot of obstacles. Those better able to cope

Explanation:

7 0
3 years ago
Read 2 more answers
An operating system change that fixes bugs improves security or enhanced features is called
Vika [28.1K]

An operating system change that fixes bugs improves security or enhanced features is called update.

It is very important to update your operating system because having the latest software version means your computer or device will be not only be more secure but will also perform better and be more reliable.

5 0
3 years ago
Read 2 more answers
Write an expression to detect that the first character of the userInput matches the firstLetter.
Strike441 [17]
Easy just put ur answrr
8 0
3 years ago
6. Which of the following items is not a storage
stealth61 [152]

Answer:

Plotters

Explanation:

A 'plotter' is an external hardware device like a printer used with a computer to 'print vector graphics' - basically in english it no hold storage like that

5 0
3 years ago
Other questions:
  • What is required to display content on transparencies?
    6·1 answer
  • ________ is a wireless protocol designed for transmitting data over short distances, replacing cables. ipv6 ipv4 paas bluetooth
    11·1 answer
  • Atomic Term If an atom carries no charge, the positive charges from protons are balanced by the negative charges from the
    11·1 answer
  • A _____ network security application that Prevents access between a private and trusted network and other untrusted networks
    9·1 answer
  • Question 9 (1 point)
    14·1 answer
  • The four compass points can be abbreviated by single-letter strings as "N", "E", "S", and "W". Write a function turn_clockwise t
    15·1 answer
  • How do I log into PGCPS?
    14·1 answer
  • Advantages of a grain crush​
    9·1 answer
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
  • what is the worst-case big o running time for finding the maximum value in an array of size n by scanning from left to right and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!