Backup storage, Basic Computer Science

Backup Storage:

Back up (backing) storage, also termed external storage, is used to hold programs and data which are read into internal storage when required. The most common form now, as for the last thirty years, is magnetic storage media, either tapes or disks. With both of these, data is recorded onto a plastic surface, coated with a varnish containing an oxide which can be magnetised in one or two directions; each magnetisation representing one bit of data. Data is written or read with the help of read/write heads, small electromagnets, close to the surface.  

Posted Date: 10/24/2012 4:12:39 AM | Location : United States







Related Discussions:- Backup storage, Assignment Help, Ask Question on Backup storage, Get Answer, Expert's Help, Backup storage Discussions

Write discussion on Backup storage
Your posts are moderated
Related Questions
Storage capacity and Cost per bit of storage: Storage capacit y:  It is the amount of data that can be stored in the storage unit. A large capacity is preferred.  Cost pe

File Sharing Architecture:   The development of microprocessor, PC and LAN transformed dumb terminals into -smart? clients. This brought a complete change in the computing env

WCDMA – FDD technology Multiple access technology is wideband CDMA (WCDMA) All cells at same carrier frequency Spreading codes used to separate cells and users Signal bandwidth 3.8

Dear sir please define what is the difference between FAT 32 and NTFS .


Question 1 Define the following terms                           1) Pipelining 2) Super Pipelining 3) Dynamic Execution 4) Multiprocessing 5) Multimedia Extensions Question 2

write advantages and disadvantages of private and public network

In this program, you are going to write a program for playing the game of Hangman. In this game, the computer will pick a word and display a sequence of blanks to be filled in; one

Programming Project You will implement 2 algorithms to solve the single source shortest paths problem, Bellman-Ford Algorithm and Dijkstra''s algorithm Allowed programming languag

Question 1 List two I/O virtualization methods. Based on different features compare these two methods Question 2 Discuss three areas considered by organizations to secure the