This article aims to educate readers on L1s that use DAG technology by fully describing how they work and how they can be used within crypto applications while also providing a method to classify various uses of DAG technology and provide knowledge of how they function.