Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate working of Magnetic Bubble Memories?
In many materials like garnets on applying magnetic fields certain cylindrical areas whose direction of magnetization is opposite to that of magnetic field are created. These are known as magnetic bubbles. Diameter of these bubbles is found to be in range of 1 micrometer. These bubbles can be moved at high speed by applying a parallel magnetic field to plate surface. So rotating field can be produced by an electromagnetic field and no mechanical motion is needed.
In these devices deposition of a soft magnetic material known as Perm alloy is made as a predetermined path so making a track. Bubbles are forced to move continually in a fixed direction on these tracks. In these memories presence of a bubble signifies a 1 while absence signifies a 0 state. For writing data in a cell a bubble generator to introduce a bubble or a bubble annihilator to eliminate a bubble are needed. A bubble detector performs read operation. Magnetic bubble memories having capacities of 1M or more bits per chip have been created. Performance and cost of these memories fall between semi-conductor RAMs and magnetic disks.
These memories are non-volatile in comparison to semi-conductor RAMs. Additionally because there are no moving parts they are more reliable than magnetic disk. However these memories are hard to manufacture and hard to interface with in conventional processors. These memories at present are used in specialized applications for example like a secondary memory of air or space borne computers where very high reliability is needed.
Explain any three policies for process scheduling that uses resource consumption information. All three policies for process scheduling are explained below in brief: 1. Fi
What is NEG instruction Arithmetic sign inversion or two's complement (NEG). NEG instruction two's complements a number which means that arithmetic sign of a signed number cha
Explain the Low Level Language - Computer Programming? An assembly language or a machine language is known as Low-level language which are closer to the hardware than are high-
Explain Open source software? Open Source Software is software for which the underlying programming code is available to the users so that they might be read it, make changes t
Explain the Executing Requests Using a Message-Passing Architecture Executing requests using a message-passing architecture requires good fundamental client-server programming
What is one-way association? One-way association means association will traverse in only in one direction and implement using the actual implementation. If the multiplicity is
Write the Add/subtract rule for floating point numbers. Ans: a. Select the number with the smaller exponent and shift its mantissa right a number of steps equal to the differe
What do you do if you have given functionality that wasn't listed in the requirements? - If the functionality isn't essential to the purpose of the application, it should be re
what is transform mapping and transaction mapping?
Creating a contacts application: First, a contact is defined as the tuple: firstName, lastName, phoneNumber and email. You will create a class Contact that allows getting a
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd