1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
4 years ago
9

How much RAM memory is recommended for your computer to be used as a digital darkroom?

Computers and Technology
1 answer:
Montano1993 [528]4 years ago
6 0

1-2 GB

I had hard time finding the answer to this, but the correct answer on my test was 1-2 GB

You might be interested in
What permanent magnets of a motor are replaced with more powerful ones, what effect do you think this would have on motor rotati
Marat540 [252]
When permanent magnets of a motor are replaced with more powerful ones, the motor rotation will increase. This is because there is more electricity being generated.
7 0
3 years ago
Read 2 more answers
I don’t understand how to make a hyperlink or put an image in an html file
Mademuasel [1]

To use image as a link in HTML, use the <img> tag as well as the <a> tag with the href attribute. The <img> tag is for using an image in a web page and the <a> tag is for adding a link. Under the image tag src attribute, add the URL of the image. With that, also add the height and width.

-tutorialspoint

8 0
3 years ago
Always follow the routine "clean up while in use and clean up before keeping it".
Anvisha [2.4K]
This answer out of the true or false or true
5 0
3 years ago
Please explain why an operating system makes a great attack target.​
BartSMP [9]
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
8 0
3 years ago
What is the HIPAA privacy rule, and why does it affect IT professionals.
user100 [1]
It protects a persons identifiable health information and medical records.
4 0
2 years ago
Other questions:
  • Under what category of programs and apps do databases and enterprise computing fall?
    8·1 answer
  • Write down the complete procedure for creating ExcelSheet.
    8·1 answer
  • Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
    6·1 answer
  • The five steps in the fetch/execute cycle and how do they correspond to a restaurant
    5·1 answer
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • How can we compare a computer with human beings?
    14·1 answer
  • Assemble a Server computer based on your budget (state the amount in Ghana Cedis), discussing the type of components (giving the
    11·1 answer
  • Help teacher said with complete explanation ​
    5·1 answer
  • Write a program that reads and unspecified number of integers, determines how many positive and negative values have been read,
    10·1 answer
  • An extent is a named portion of secondary memory allocated for the purpose of storing physical records.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!