What is secondary storage systems, Computer Engineering

Assignment Help:

There are various limitations of primary memory like limited capacity which is its not enough to store a very large volume of data and volatility which is when power is turned off data stored is lost. So Secondary storage system should provide large storage capacities, low cost per bit as well as medium access times. Magnetic media have been used for these purposes for a long time. Current magnetic data storage devices take form of floppy disks in addition hard disks and are used as secondary storage devices. However audio and video media either in compressed form or uncompressed form need higher storage capacity than other media forms and storage cost for these kinds of media is considerably higher. 

Optical storage devices provide a higher storage density at a lower cost. CD-ROM can be used as optical storage device. Many software companies provide both operating system and application software on CD-ROM today. This technology has been main catalyst for development of multimedia in computing since it is used in multimedia external devices like video recorders and digital recorders (Digital Audio Tape) that can be used for multimedia systems. 

Removable disk, tape cartridges are other forms of secondary storage devices are used for back-up purposes having higher storage density and higher transfer rate.


Related Discussions:- What is secondary storage systems

Describe the analytical engine by babbage, THE ANALYTICAL ENGINE BY BABBAGE...

THE ANALYTICAL ENGINE BY BABBAGE: It was general use computing device that could be used for performing any types of mathematical operation automatically. It contains the follo

How many precision resistors requires a weighted resistor, A weighted resis...

A weighted resistor digital to analog converter using N bits requires a total of ? Ans. Digital to analog converter, a weighted resistor using N bits needs a total of N precisi

Smli firewalls are different from the conventional, SMLI firewalls are diff...

SMLI firewalls are different from the conventional The SMLI firewalls are different from the conventional "stand in" proxies in a way that the stand-in proxies are used for th

Explain a public key encryption system, Explain a public key encryption sys...

Explain a public key encryption system? A public key encryption system permits only the correct receiver to decode the data.

Define the pulse-triggered (master-slave) flip-flops, Define the Pulse-Trig...

Define the Pulse-Triggered (Master-Slave) Flip-flops? The term pulse-triggered signify that data are entered into the flip-flop on the rising edge of the clock pulse, though th

What is monitoring-and-surveillance agents, Q. What is monitoring-and-surve...

Q. What is monitoring-and-surveillance agents? ANSWER: Monitoring-and-surveillance agents or predictive agents are intelligent agents that examine and report on equipment.

Use of delay loops, A very useful application of assembly is to generate de...

A very useful application of assembly is to generate delay loops. These loops are used for waiting for some time before execution of subsequent instruction. However how to find

Differentiate between time sharing & batch operating system, Differentiate ...

Differentiate between Batch Operating System and Time Sharing Operating System? Batch operating systems : A batch is a sequence of jobs. Such batch is submitted to batch proce

Which is valid syntax of the fork and join primitive, Which is valid syntax...

Which is valid syntax of the Fork and Join Primitive? Ans. A valid syntax of the Fork and Join Primitive is as given below: Fork Join

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd