Magnetic tapes and magnetic disk, Basic Computer Science

Assignment Help:

Magnetic tapes and Magnetic Disk:

Magnetic tapes are very commonly used for storing large quantum of data for which rapid access is not necessary; specially for archival data backups etc. Tapes are cheap means of storing data but access is generally slow. Small cassette tapes, of relatively low capacity are used with microcomputers. 

Magnetic Disks are most widely used form of backing storage, suitable for holding information required rapidly for example, data for a running program. In the type of disk drive in larger computer systems, data is recorded on the flat surfaces of a stack of circular disks revolving on a common spindle, with one read/write head for each disk. Access times, typically 0.01  seconds, although much faster than tape, are rather slow, by comparison with other computer operations, and disk access times are one of the main limiting factors in the speed of operation of retrieval systems with information stored on disk. 

Disk capacities have increased greatly, from original values of about 10 MB (Mega Bytes to present units with 1 GB (Gigabytes which is one thousand million bytes). Smaller computer systems use Winchester disks, with a single hard disk in a sealed unit, floppy disks, which are compact, cheap and convenient for transfer of programs and data. They are limited in storage capacity, with relatively slow access times, and less convenient than a hard disk in day to day use. Floppy disks now are available in two sizes, 5.25 and 3.5 inches., 


Related Discussions:- Magnetic tapes and magnetic disk

Interpreter, Interpreter: An interpreter is a program that translates...

Interpreter: An interpreter is a program that translates each statement in the programming language into machine code and runs it.  Such an arrangement means that to run the

Probability, Suppose that of 100 computers checked for viruses 30 where inf...

Suppose that of 100 computers checked for viruses 30 where infected and 70 where not. If we select 10 computers at random what is the probability that at most 4 of them are infecte

Cryptography, Assume |s1|=|s2|=n and consider the functions defined, for an...

Assume |s1|=|s2|=n and consider the functions defined, for any s1 and s2, as: (a) G1(s1,s2)=s1 xor s2, (b) G2(s1,s2)=(s1, s2, s1 xor s2). We have that: A. G1 and G2 are pseudo-ra

Simple batch systems, Simple Batch Systems: Early machines were very...

Simple Batch Systems: Early machines were very expensive, and therefore it was important to maximize machine utilization. To improve utilization, the concept of batch operat

Right click on a folder, I want the detailed theory about the options which...

I want the detailed theory about the options which occur when we right click on a folder.

Defining micro-operations, Problem 1. What are Micro-operations? Explai...

Problem 1. What are Micro-operations? Explain Micro operations of the Fetch cycle. Defining Micro-operations Its explanation of the fetch cycle 2. Differen

Eeprom, Ask queswhat is the advanages of eeprom?

Ask queswhat is the advanages of eeprom?

IPC in linux, to do a assignment regarding IPC in linux

to do a assignment regarding IPC in linux

Algorithms and psuedocodes, write an algorithm and psuedo code for the oper...

write an algorithm and psuedo code for the operation of the cramer`s rule

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd