1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
9

What is processor, memory RAM, cDRAM,DVD RAM,video card​

Computers and Technology
1 answer:
Fed [463]3 years ago
6 0

Answer:

See explanation below:

Explanation:

The processor is the CPU, the Central Processing unit. It is connected to the other key parts of the computer.

RAM - Random Access memory - is where programs are stored after the computer starts up again. Data is only present in RAM when the system is powered up and when data has been loaded through operation of programs such as those on the Hard Drive.

CD-ROM - this is a rigid disk. Data is stored on this disk by using a focused laser. The read-process also involves using a laser. Some CD-ROMs store about 700MB of data, some store more, some less.

DVD - this is also a rigid disk. It is more complex than a CD-ROM. More data can be stored on a DVD than on a CD-ROM. These hold about 4.6GB of data. This is about six times more than a CD-ROM.

Video Card - This is the circuit card that is between the computer system and the video display. The information in the computer is sent to the Video card. Then the video card forms the data stream that can go to the monitor, so data can be displayed and interacted with.

Hope this helps! Have an Awesome Day!! :-)

You might be interested in
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
3 years ago
Why is there no window on dishwsher
olchik [2.2K]

Because most people really don't want or need to see what's in there.

If you want to, open the door during the cycle. It won't harm anything.

If you're curious to see a dishwasher in action, some appliance showrooms have a display model, where the spray parts and the racks are in an entirely transparent box. They're to show how powerfully and completely the stuff inside will get cleaned, but you can also see how the dishwasher is intended to work, by filling with just a couple of inches of water, and then recirculating it for the duration of the cycle, to loosen the stuff on the dishes.

3 0
3 years ago
Read 2 more answers
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
3 years ago
WILL GIVE BRAINLIEST AND 30 POINTS!! NEED ASAP!!!!
kotykmax [81]

Answer:

Explanation:

1. In tabletop games and video games, game mechanics are the rules that guide the player's moves or actions, as well as the game's response to them.

5.User interface is about the visual design and the information designs around the screens while the User Experience is about the whole experience and not only about the screen. User interface is mainly focused on the product while User experience on the other hand mostly focuses on the user and their journey through the product.

5 0
3 years ago
Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the
alekssr [168]

Answer:

Complete design is attached below.please have a look.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • True or false? It is just too challenging to have different password for every
    12·1 answer
  • In the mouse properties Window, you Can
    6·1 answer
  • Vitamins and minerals dissolve easily in water.True or false?
    5·1 answer
  • A ____ is a program that lets computer users create and access a collection of organized data.
    14·1 answer
  • Text that is heavier or darker than other text in the document is considered _____.
    9·2 answers
  • Write out the base sequence that is added directly after the primer. In order for Moodle to correctly grade this question, write
    11·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • You are splitting up all your apples equally between 3 people. which statement below will calculate how many apples will be left
    12·1 answer
  • How does microsoft label mac addresses in the windows utilities that show you the mac address?
    13·1 answer
  • Which language should you use to add functionality to web pages.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!