Sequential-access memory device, Basic Computer Science

Sequential-access memory device:

A  Sequential-access  memory device reads data in sequence. In other words, information on a serial device can only be retrieved in the same sequence in which it is stored. Data is recorded one after another in a predetermined sequence (such as in numeric order) on a storage medium. Sequential processing is quite suitable for such applications like preparation of monthly pay slips, or monthly electronic bills etc., where each address needs to be accessed in turn. If you are working with a sequential access device and information is stored at the last address, then data stored at the last address cannot be accessed until all preceding locations in the sequence have been traversed. That is locating an individual item of data requires searching the  recorded data on the tape until the desired item is located.  

1026_Sequential-access memory device.png

Posted Date: 10/22/2012 4:11:47 AM | Location : United States







Related Discussions:- Sequential-access memory device, Assignment Help, Ask Question on Sequential-access memory device, Get Answer, Expert's Help, Sequential-access memory device Discussions

Write discussion on Sequential-access memory device
Your posts are moderated
Related Questions
identify application software from the list? ms excel linux internet explorer adobe photshop sound card driver window disk manger adobe dream weaver windows file explorer

How to write an algorithm to reverse the order of elements on a stack s using two additional stacks


Here are the more specific requirements and the related points - use the below as a check-off list when you make your presentation.  Please note . . . many of the requirements are

Digital Camera: A Digital camera is an electronic device which takes video or still photographs or both, digitally by recording images via an electronic image sensor. Digital

Question (a) A dairy wants to determine the quantity of butter it should produce to meet the demand. Past records have shown the following demand pattern:

1. What is Evaluating Information System Investments? 2. Is IS evaluation different to evaluation of other investments? 3. What approaches are used to evaluate IS investments

Syntax: Syntax provides the structure and how to formulate the phrase or sentence w.r.t grammar of the language. It tells us about which composition is allowed from the charac

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

In this technique, the kernel knows about and handles the threads. No runtime system is required in this case. In place of thread table in each process, the kernel has a thread tab