1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
5

What is the transfer rate of DDR memory?

Computers and Technology
1 answer:
hoa [83]3 years ago
5 0

DDR memory is 64-bit so that means that it is 64

You might be interested in
Creating a Graphical User Interface in Java
tankabanditka [31]

Answer:

JPanel PayrollPanel=new JPanel();

JButton saveButton=new JButton("Save");

A full code snippet and screen shot is provided in the explanation section

Explanation:

import java.awt.*;

import javax.swing.*;

public class TestClass {

   TestClass()  {

       JFrame f= new JFrame("Payroll Panel");

       JPanel payrollPanel=new JPanel();

       payrollPanel.setBounds(10,20,200,200);

       payrollPanel.setBackground(Color.gray);

       JButton saveButton=new JButton("Save");

       saveButton.setBounds(50,100,80,30);

       saveButton.setBackground(Color.yellow);

       payrollPanel.add(saveButton);

       f.add(payrollPanel);

       f.setSize(400,400);

       f.setLayout(null);

       f.setVisible(true);

   }

   public static void main(String args[]) {

       new TestClass();

   }

}

4 0
4 years ago
Which of the following gestures would you use if you want to activate a link on your new tablet?
Gre4nikov [31]

Answer:

press and hold

Explanation:

When you press and hold, some open a menu where you can add a link

8 0
3 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
vitfil [10]

Answer:

64 bits.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the word size used by it is 64 bits.

3 0
3 years ago
CRM systems provide an organization with an important element: all employees of the company who directly or indirectly serve a c
Vilka [71]

Answer: On the same page

Explanation:

 The CRM is basically stand for the customer relationship management that are design to support all the relationship with the customers. It basically analysis the data about the customers to improve the relationship and growth in the organization.

All the employees in the organization are directly and indirectly server the customers are basically o the Same page by the individual computers.

The CRM approach are basically compile the given data from the different communication source such as company website, email and telephone.

 

8 0
4 years ago
Explain at least 5 parts a a computer.
Stels [109]

Answer: There are many parts of a computer, but there are basic ones and major ones.

Explanation: Computers may look very different, but the components installed are standard. The major difference among most machines is the brand of hardware installed. The hardware components—video card, processor, memory, motherboard and hard drive—are the same for all computer systems. While, these are the major ones: Motherboard.

Processor/CPU.

Power Supply.

Hard Drive.

PCI-Express Cards.

Graphics Cards.

RAM/Memory.

6 0
4 years ago
Other questions:
  • To move to the most extreme right cell containing data in your worksheet, what basic key combination can you use?
    7·1 answer
  • Can some one fix this <br> input ("Enter a number: ") <br> print (num * 8)
    9·1 answer
  • Nonvolatile in the context of data storage means ________________. a. the data can't be changed in a data warehouse. b. the data
    11·1 answer
  • Write a short program using a while loop which will display all of the even numbers starting with 12 and ending with 86. (test y
    10·1 answer
  • You have implemented a network where each device provides shraed files with all other devices on the network. what type of netwo
    10·1 answer
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • What is not true about field properties in Access?
    13·1 answer
  • Java Programming
    14·1 answer
  • Which attributes does not come in tag?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!