Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
There are various limitations of primary memory like limited capacity which is its not enough to store a very large volume of data and volatility which is when power is turned off data stored is lost. So Secondary storage system should provide large storage capacities, low cost per bit as well as medium access times. Magnetic media have been used for these purposes for a long time. Current magnetic data storage devices take form of floppy disks in addition hard disks and are used as secondary storage devices. However audio and video media either in compressed form or uncompressed form need higher storage capacity than other media forms and storage cost for these kinds of media is considerably higher.
Optical storage devices provide a higher storage density at a lower cost. CD-ROM can be used as optical storage device. Many software companies provide both operating system and application software on CD-ROM today. This technology has been main catalyst for development of multimedia in computing since it is used in multimedia external devices like video recorders and digital recorders (Digital Audio Tape) that can be used for multimedia systems.
Removable disk, tape cartridges are other forms of secondary storage devices are used for back-up purposes having higher storage density and higher transfer rate.
THE ANALYTICAL ENGINE BY BABBAGE: It was general use computing device that could be used for performing any types of mathematical operation automatically. It contains the follo
A weighted resistor digital to analog converter using N bits requires a total of ? Ans. Digital to analog converter, a weighted resistor using N bits needs a total of N precisi
SMLI firewalls are different from the conventional The SMLI firewalls are different from the conventional "stand in" proxies in a way that the stand-in proxies are used for th
Explain a public key encryption system? A public key encryption system permits only the correct receiver to decode the data.
Define the Pulse-Triggered (Master-Slave) Flip-flops? The term pulse-triggered signify that data are entered into the flip-flop on the rising edge of the clock pulse, though th
Q. What is monitoring-and-surveillance agents? ANSWER: Monitoring-and-surveillance agents or predictive agents are intelligent agents that examine and report on equipment.
A very useful application of assembly is to generate delay loops. These loops are used for waiting for some time before execution of subsequent instruction. However how to find
Differentiate between Batch Operating System and Time Sharing Operating System? Batch operating systems : A batch is a sequence of jobs. Such batch is submitted to batch proce
Which is valid syntax of the Fork and Join Primitive? Ans. A valid syntax of the Fork and Join Primitive is as given below: Fork Join
how to reduce risc pipelining structure
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd