1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
9

What is processor, memory RAM, cDRAM,DVD RAM,video card​

Computers and Technology
1 answer:
Fed [463]3 years ago
6 0

Answer:

See explanation below:

Explanation:

The processor is the CPU, the Central Processing unit. It is connected to the other key parts of the computer.

RAM - Random Access memory - is where programs are stored after the computer starts up again. Data is only present in RAM when the system is powered up and when data has been loaded through operation of programs such as those on the Hard Drive.

CD-ROM - this is a rigid disk. Data is stored on this disk by using a focused laser. The read-process also involves using a laser. Some CD-ROMs store about 700MB of data, some store more, some less.

DVD - this is also a rigid disk. It is more complex than a CD-ROM. More data can be stored on a DVD than on a CD-ROM. These hold about 4.6GB of data. This is about six times more than a CD-ROM.

Video Card - This is the circuit card that is between the computer system and the video display. The information in the computer is sent to the Video card. Then the video card forms the data stream that can go to the monitor, so data can be displayed and interacted with.

Hope this helps! Have an Awesome Day!! :-)

You might be interested in
To connect multiple usb devices to a single usb port, a ____ can be used.
elena55 [62]
<span>USB hubs can be used in this situation. These hubs typically have four to six USB ports, and can thereby allow the connection of more devices than the typical one-to-one connection that a standard USB port will give. This allows the user to expand the number of devices that the computer can read at any one time.</span>
4 0
3 years ago
There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
Ivanshal [37]

Answer:

<u>c. public-key certificates.</u>

Explanation:

It is important to<em> note</em> that in Kerberos infrastructure, <em>tickets </em>are issued by a third party as part of the authentication process.

This authentication process corresponds most closely to that of the Public Key certificates Infrastructure since it is a third party that issues out tickets to authenticate both parties engaged in the communication over a network.

6 0
3 years ago
When does the VB.NET programming environment start to operate?
drek231 [11]

Answer:

B. once a VB.NET project is created in the Microsoft Visual Studio environment.

Explanation:

Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.

5 0
3 years ago
What content is important to include in your webpage?
Pavel [41]

Answer:

The key to a successful website is having clear, relevant and keyword-rich content that delivers the right message with power and conviction. The content on your website should target your audience, engage them and persuade them to take action.

8 0
3 years ago
What is the purpose of the making of Nintendo Switch?
Elden [556K]

Answer:

To create a console that is suitable for children and families.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Bitnet, one of the predecessors of the internet was launched in 1981. what does bitnet stand for?
    12·1 answer
  • Which of the following is NOT a web browser?<br> Safari<br> Chrome<br> Bing<br> Firefox
    8·2 answers
  • What is the main feature of chat rooms?
    9·2 answers
  • Which types of files can be used to define Kubernetes manifest files? yaml, json, yaml and text files
    5·1 answer
  • What is a characteristic of maintaining logs in a system? A. Logging prevents security violations, but only deals with passive m
    10·1 answer
  • How do you create a formula in excel​
    10·1 answer
  • Question 7 (True/False Worth 3 points)
    8·2 answers
  • Write any two disadvantage of First generations computers​
    14·1 answer
  • PLEASE HELP! WILL MARK AS BRAINLIEST!
    6·2 answers
  • A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the bett
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!