Optical storage - computer architecture, Computer Engineering

Assignment Help:

Optical storage - computer architecture:

Optical storage, the distinctive Optical disc, stores information in deformities on the surface of a circular disc and reads this information by revealing the surface with a observing the reflection with laser diode. Optical disc storage is non-volatile storage. The deformities can be enduring (read only media), formed only one time (write once media) or reversible (recordable or read/write media). Following forms are now in common use:

  • CD, CD-ROM, DVD, BD-ROM: Read only storage are  used for mass distribution of digital information ( video computer programs , Music)
  • DVD-R, CD-R, DVD+R BD-R: Write once storage, it is used for off-line or tertiary storage
  • CD-RW, DVD-RW, DVD-RAM, DVD+RW, BD-RE:, fast read storage, Slow write can be used for tertiary and off-line storage
  • Ultra Density Optical stand for UDO is similar in capacity to BD-RE or BD-R and is, fast read storage, slow write and can be used for tertiary and off-line storage.

Magneto-optical disc storage is optical disc storage wherever the magnetic state on a ferromagnetic surface stores information. The information is read optically and written by combining optical methods and magnetic and. Magneto-optical disc storage is non-volatile storage, slow write, sequential access, fast read storage and can be used for tertiary and off-line storage.

 


Related Discussions:- Optical storage - computer architecture

Address phase timing - computer architecture, Address phase timing: On...

Address phase timing: On the rising edge of clock 0, the initiator notes IRDY # and FRAME# both high, and GNT# low, so it drives the command, address and asserts FRAME# in tim

Difference among using a filter and a query to find records, What is the di...

What is the difference among using a filter and a query to find records? Filter is used to quickly limit the records as we are already viewing in a Datasheet or a form to those

Security, We now consider the relation between passwords and key size. For ...

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

Why is catch almost always a bad idea, Why is catch (Exception) almost alwa...

Why is catch (Exception) almost always a bad idea?  Well, if at that point you know that an error has happened, then why not write the proper code to handle that error instead

Design requirements of sequential circuit, What are the Requirements to des...

What are the Requirements to design Sequential circuit Ans . Design Requirements of Sequential circuit: (i) The circuit specifications translated into a state diagram

Carry save addition and generated and propagate function, Explain carry sav...

Explain carry save addition (CSA) process. Ans: Instead of allowing the carries ripple along the rows, they can be saved and then introduced into the next roe at the right wei

Adbms, what are the different way of executing pipelines

what are the different way of executing pipelines

Discuss the advantages of expression tree, Discuss its advantages over the ...

Discuss its advantages over the other evaluation techniques. The expression tree is determined by using a post-order traversal of the expression tree as given here: 1. If such

Which scheduler select process from secondary storage device, Which schedu...

Which scheduler selects processes from secondary storage device? Ans. Medium term scheduler selects processes from secondary storage device.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd