Magnetic tapes and magnetic disk, Basic Computer Science

Assignment Help:

Magnetic tapes and Magnetic Disk:

Magnetic tapes are very commonly used for storing large quantum of data for which rapid access is not necessary; specially for archival data backups etc. Tapes are cheap means of storing data but access is generally slow. Small cassette tapes, of relatively low capacity are used with microcomputers. 

Magnetic Disks are most widely used form of backing storage, suitable for holding information required rapidly for example, data for a running program. In the type of disk drive in larger computer systems, data is recorded on the flat surfaces of a stack of circular disks revolving on a common spindle, with one read/write head for each disk. Access times, typically 0.01  seconds, although much faster than tape, are rather slow, by comparison with other computer operations, and disk access times are one of the main limiting factors in the speed of operation of retrieval systems with information stored on disk. 

Disk capacities have increased greatly, from original values of about 10 MB (Mega Bytes to present units with 1 GB (Gigabytes which is one thousand million bytes). Smaller computer systems use Winchester disks, with a single hard disk in a sealed unit, floppy disks, which are compact, cheap and convenient for transfer of programs and data. They are limited in storage capacity, with relatively slow access times, and less convenient than a hard disk in day to day use. Floppy disks now are available in two sizes, 5.25 and 3.5 inches., 


Related Discussions:- Magnetic tapes and magnetic disk

Networking, what is computer topology .

what is computer topology .

Networking operating systems, Networking Operating Systems,  Networking OS ...

Networking Operating Systems,  Networking OS provides file sharing, Networking OS provides communication scheme, NT Server Security added Multi user capability added RAI

Artificial intelligence, Artificial Intelligence Artificial Intelligen...

Artificial Intelligence Artificial Intelligence is difficult science to explain, as it has fuzzy borders with  computer science, mathematics,  philosophy, physics,  psychology

Execution of a machine instruction, Execution of a machine instruction: ...

Execution of a machine instruction: Execution of a machine instruction on modern processors involves a complex sequence of operations with multiple cycles. One instruction cyc

ICT, what are the significance of telecommunications deregulation

what are the significance of telecommunications deregulation

Immediate addressing, These addressing modes are: With immediate addressing...

These addressing modes are: With immediate addressing, no lookup of data is essentially required. The data is located in the operands of the instruction itself, not in a different

Computer architecture, Subject Name CIT2193 COMPUTER ARCHITECTURE Topic AS...

Subject Name CIT2193 COMPUTER ARCHITECTURE Topic ASSIGNMENT Due Date 16 March 2012 Name : ……….…………………….……………….. Lecturer : ................................. Intake : ………………….

Unix shell and history problem, UNIX Shell and History feature. 1.Creating ...

UNIX Shell and History feature. 1.Creating a child process. 2.Creating a history feature. Its exactly "programming project 1 - Unix Shell and History Feature (p.157-159)" in the Si

Cipher program in java, Cryptography, the study of secret writing, has been...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd