Raid and data stripping, Computer Engineering

Explained RAID?

Ans: High performance devices tend to be costly. So we can gain very high performance at a reasonable cost using a number of low-cost devices operating in parallel. It is known RAID( Redundant array of Inexpensive Disks).

Explain data stripping?

Ans: A single big file is stored in various separate disk units by breaking the file up into a number of smaller pieces and storing these pieces on different disks. It is called data stripping.

Define the process of organized data in the disk?

Ans: Each surface is divided into concentric tracks, and each track is divided into sectors. The set of equivalent tracks on all surfaces of a stack of disks forms a logical cylinder. The data are accessed using read/write head.

 

Posted Date: 10/13/2012 8:31:14 AM | Location : United States







Related Discussions:- Raid and data stripping, Assignment Help, Ask Question on Raid and data stripping, Get Answer, Expert's Help, Raid and data stripping Discussions

Write discussion on Raid and data stripping
Your posts are moderated
Related Questions
c program??????????

Q.  Write short note on Interfacing Keyboard, giving block diagram. Why do we need to introduce circuitry called Keyboard Status Word Generator?

The VLSI technology is still developing. More and more powerful microprocessors and more storage space now are being put in single chip. One question that we have still not conside

1. It is hard even for a highly skilled experts to abstract good situational assessment when he is under time pressure. 2. Expert systems perform well with specific t

A program is to be developed to simulate the operations of a scientific calculator. List the facilities to be provided by this calculator. Analyze this using a DFD 0- level and 1-

What is a system call? A  system  call  is  a  request  made  through  any  program  to  the  operating  system  for performing tasks, picked by a predefined set, that the said

Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati


COMPUTER FUNDAMENTALS 1. Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conduc

Interrupt vector table is always created in first 1K area of the memory. Explain why? When CPU receives an interrupt type number from PIC, it uses this number to look up corres