Mutability and accessibility of primary memory, Computer Engineering

Assignment Help:

Mutability and Accessibility of primary memory:

Mutability:

Read/write storage or mutable storage

 It provides permit ion for the information to be overwritten at any time. A computer without some amount of read/write storage for primary storage would be useless for various tasks. Modern computers use read/write storage also for secondary storage.

Read only storage

Receive the information which  stored at the time of manufacture, and write once storage (Write Once Read Many) permit the information to be written only once at some point after manufacture. These are known as immutable storage. Immutable storage is utilized for off-line storage and tertiary.  For Examples: CD-ROM and CD-R.

Slow write, fast read storage

Read/write storage which permit information to be overwritten multiple times, but along with the write operation being much slower than the read operation? For instance: flash memory and CD-RW

Accessibility:

Random access

In storage any location may be accessed at any moment in approximately the same amount of time. Such type of characteristic is well suited for primary & secondary storage.

Sequential access

Pieces of information will be accessed of in a serial order, one after the other; so the time to access a specific piece of information depends upon which piece of information was last accessed.

Such characteristic is distinctive of off-line storage.


Related Discussions:- Mutability and accessibility of primary memory

Explain handlers classification, Handlers Classification In 1977, Wolfg...

Handlers Classification In 1977, Wolfgang Handler suggested a complex notation for representing the pipelining and parallelism of computers. Handler's categorization addresses

Explain how presentation layer helps in establishing, Explain how presentat...

Explain how presentation layer helps in establishing and processing data in End to End layers. The idea of the presentation layer is to stand for information to the communicati

Design a memory buffer of limited size, Extend task 1 so that it now suppor...

Extend task 1 so that it now supports a memory buffer of limited size. Provide the same functionality as task 1 except now make the server work with a limited buffer size. Like

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Explain what are video and graphic in multimedia application, Question: ...

Question: (a) Copying a graphic image from the Web will be as easy as pointing to it and clicking the right mouse button or performing a screen capture. The question is, under

Show the Features of parallel virtual machine, Q. Show the Features of para...

Q. Show the Features of parallel virtual machine? Easy to install; Easy to configure; Multiple users each can use PVM concurrently; Multiple applications fro

Explain definition of fibonacci, Explain definition of fibonacci Where ...

Explain definition of fibonacci Where an input value gives a trivial result, it is returned directly, otherwise the function calls itself, passing a changed version of the inpu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd