1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
2 years ago
12

What are the uses of DVD Ram​

Computers and Technology
2 answers:
Sidana [21]2 years ago
6 0
DVD Ram Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.
Verdich [7]2 years ago
4 0

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

You might be interested in
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
Microwave transmits information between network nodes using
tekilochka [14]

Answer:

Towers and satellite.

Explanation:

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver.

Generally, the most commonly used electromagnetic wave technology in telecommunications is radio waves.

Radio waves can be defined as an electromagnetic wave that has its frequency ranging from 30 GHz to 300 GHz and its wavelength between 1mm and 3000m. Therefore, radio waves are a series of repetitive valleys and peaks that are typically characterized of having the longest wavelength in the electromagnetic spectrum.

Basically, as a result of radio waves having long wavelengths, they are mainly used in long-distance communications such as the carriage and transmission of data.

The distance from one peak to the next peak is called wavelength. This distance is also equal to the distance from one trough of a wave to another.

Also, microwave is a form of radio waves which typically has short wavelengths and frequency ranging from 300 MHz and 300 GHz.

Hence, microwave transmits information between network nodes using towers and satellite.

7 0
2 years ago
Read 2 more answers
How is a contact list different from an address book
WITCHER [35]
An address book has a list of addresses
7 0
3 years ago
Read 2 more answers
একটি ডকুমেন্ট তৈরী করে ড্রাইভে সেভ করার পদ্ধতি বর্ণনা করো
kotykmax [81]

Answer:

To create a document, you have to go into Google Docs and make a new document, and then it automatically saves to Drive for you.

Explanation:

4 0
3 years ago
Which statement most thoroughly describes the profession of an engineer​
Free_Kalibri [48]

Answer:

During the engineering design process, the responsibilities of the engineer may include defining problems, conducting and narrowing research, analyzing criteria, finding and analyzing solutions, and making decisions. Much of an engineer's time is spent on researching, locating, applying, and transferring information.

Explanation:

5 0
2 years ago
Other questions:
  • Jim is in the market for a car that will last for the next 10 years and has saved up some money for the purpose of a car. What’s
    6·1 answer
  • What is the numeric range of a 16-bit twos complement value? A 16-bit excess notation value? A 16-bit unsigned binary value?
    15·1 answer
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exac
    7·1 answer
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x >=
    7·2 answers
  • The ________ view in access looks similar to an excel spreadsheet.
    5·1 answer
  • Create a dictionary with types as integer and string.
    10·1 answer
  • In most operating systems what is running application called?
    5·1 answer
  • How does Python recognize a tuple?
    12·1 answer
  • Please help me on this I don't know which one they are​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!