Solved

CROM

Posted on 1998-10-07
4
159 Views
Last Modified: 2010-04-27
I have seen the term CROM (not CDrom) relating to mac software. What is it.
Is CD-ROM & CROM one and the same
0
Comment
Question by:nethala
  • 2
4 Comments
 
LVL 2

Expert Comment

by:bushhead
ID: 1011222
probably a typing error.

bush
0
 
LVL 5

Accepted Solution

by:
scrapdog earned 0 total points
ID: 1011223
CROM and CDROM are not the same thing.

CROM is Control Read-Only Memory, which is a special kind of ROM storage in the control block of some microprocessors.

0
 

Author Comment

by:nethala
ID: 1011224
Scrapdog
Where can I get more info on this. Can you suggest some websites or books on this issue
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 1011225
Your best bet is to find a site about microprocessors.  A good place to start would be:

http://dir.yahoo.com/Computers_and_Internet/Hardware/Components/Microprocessors/

I doubt that there is a site or book devoted to CROM that is not directed towards a technical professional.  Most likely information would be found in a general site about microprocessors.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question