1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sp2606 [1]
1 year ago
11

Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.

Computers and Technology
1 answer:
zvonat [6]1 year ago
4 0

Data is stored on optical discs using a laser to either melt the disc material or change the color of the embedded dye.

<h3>What is an optical disc?</h3>

Typically, an optical disk is a computer disk that reads and writes data utilizing procedures and technologies connected to optical storage.

Both writing and reading data off of an optical disk are done with a low-power laser beam. One type of electronic data storage device is an optical disk.

An optical disc (OD) is a compact, circular, digital disc, particularly when using laser beam technology, created and developed for the storing of computer data.

For instance, a compact disc (CD) can retain digital data because it was made using polycarbonate, an extremely durable and brittle material, and one (1) or more metal layers.

In this perspective, it makes sense and makes logical sense to assume that data is normally stored on optical discs by melting the disc material or changing the color of the contained dye using a laser.

To learn more about optical discs refer to:

brainly.com/question/28066311

#SPJ4

You might be interested in
During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such
Firlakuza [10]

Answer:

The answer is "physical design"

Explanation:

This design is the method of translating the specification of circuits into a physical design that explains how cells and roads connect. It is an architecture, that involves the system's internal processes of input and output.

  • This system is created by establishing the design criteria, which determines basically what the applicant system is doing.  
  • It includes the architecture, process architecture and software design of user interfaces.
6 0
2 years ago
The name for the instructions you write to a computer in a program
aliina [53]

Answer:

Code

Explanation:

The code is instructions that you can write yourself or download from online

4 0
1 year ago
Read 2 more answers
O How basic blocks are identified and how the blocks are used to construct control flow graphs
OLEGan [10]

Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Note that  Basic Block is said to be a composition  of statements that is known to be one that often always executes one after other, and this is often done in a sequence.

<h3>How do you create a flow graph from the basic blocks?</h3>

Flow graph  is gotten by:

  • Lets Block B1 be the initial node and also Block B2 will tend to follows B1, so from B2 to B1 there is seen a kind of an edge.

Note that the first task is for a person to partition a sequence of three-address code and this is done into basic blocks.

Hence, Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Learn more about basic blocks from

brainly.com/question/132319

#SPJ1

5 0
1 year ago
Alarm filtering is alarm clustering that may be based on combinations of frequency, similarity in attack signature, similarity i
Angelina_Jolie [31]
Wait what is the question? All you are saying is a fact. :|
4 0
3 years ago
Which of the following is not one of the steps a company would take in an attempt to prevent a malfunction or failure of their p
bulgar [2K]

Answer:

A overdesign

Explanation:

7 0
2 years ago
Other questions:
  • List of programming languages and their typing
    5·2 answers
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • Which is true about TCP and UDP? Choose two answers.
    15·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • What's a sentence with the words trickle and resume in it? they can be in any tense. Thanku​
    5·1 answer
  • Which of the following terms best describes the security domain that relates to how data is classified and valued?
    14·1 answer
  • Hi I m from India plz follow me and I will follow u​
    15·2 answers
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • If you answer I will mark brainliest!!! I want to be able to see two websites on my screen at the same time, how do I do that on
    9·1 answer
  • What is the decimal value for the jump control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!