1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
9

What is processor, memory RAM, cDRAM,DVD RAM,video card​

Computers and Technology
1 answer:
Fed [463]3 years ago
6 0

Answer:

See explanation below:

Explanation:

The processor is the CPU, the Central Processing unit. It is connected to the other key parts of the computer.

RAM - Random Access memory - is where programs are stored after the computer starts up again. Data is only present in RAM when the system is powered up and when data has been loaded through operation of programs such as those on the Hard Drive.

CD-ROM - this is a rigid disk. Data is stored on this disk by using a focused laser. The read-process also involves using a laser. Some CD-ROMs store about 700MB of data, some store more, some less.

DVD - this is also a rigid disk. It is more complex than a CD-ROM. More data can be stored on a DVD than on a CD-ROM. These hold about 4.6GB of data. This is about six times more than a CD-ROM.

Video Card - This is the circuit card that is between the computer system and the video display. The information in the computer is sent to the Video card. Then the video card forms the data stream that can go to the monitor, so data can be displayed and interacted with.

Hope this helps! Have an Awesome Day!! :-)

You might be interested in
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
2 years ago
Unit 7 - Planning and Designing a Website
quester [9]

Am not sure about no.2 and no.4
But am going to answer
1.true
3.true
5.true
8 0
2 years ago
What is the largest safety threat to the ISS?<br> Will give brainlest :)
bulgar [2K]

Answer:

The largest safety threat to the ISS are the micrometeorite and orbital debris (MMOD) fires, impacts and toxic spills. These pose the biggest threat to the ISS astronauts.

Explanation:

The debris is as a result of collisions. An observation revealed that once a certain mass is passed, collisions give rise to more debris.

Another report revealed that the station has about 55% chance of being hit by tiny space rocks over a 10-year period. They can protected by installing new impact-protecting panels to the exterior of the station.

ISS means International Satellite Station.

4 0
3 years ago
This type of program is designed to be transmitted over the internet and run in a web browser
vodomira [7]
This sounds like a web-based application because they are designed to be ran within a website, generally with Adobe Flash.
8 0
3 years ago
Other questions:
  • Which of the following is not an advantage of using asynchronous data transmission
    15·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
    14·1 answer
  • A company currently uses Microsoft Active Directory as its identity provider. The company recently purchased Oracle Cloud Infras
    13·1 answer
  • What output is produced by
    10·1 answer
  • Which shape is used for input or output?
    15·1 answer
  • Pls tell me the answer pls i need the answer
    6·2 answers
  • Amy wants to make an exact replica of a specific area in an image. Which tool Amy will use?
    12·1 answer
  • In a relational database, information is organized into tables in which each row represents a(n ) ________. Group of answer choi
    6·1 answer
  • Which emerging technologies will have more injury on our day to day country &amp; How?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!