Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is typical storage hierarchy?
A typical storage hierarchy is displayed in Figure above. Though Figure shows only block diagram however it includes storage hierarchy:
Register
Cache memory
Main memory
Secondary Storage and
Mass Storage.
As we move up hierarchy we encounter storage elements which have faster access time and higher cost per bit stored as well as slower access time as a result of moving down hierarchy. So cache memory normally has the fastest access time and the smallest storage capacity as well as the highest cost per bit stored. Primary memory (main memory) falls next in storage hierarchy list. On-line, direct-access secondary storage devices like magnetic hard disks make up level of hierarchy just below main memory. Off-line, direct-access and sequential access secondary storage devices like magnetic tape, ZIP disk, Floppy disk and WORM disk etc. fall next in storage hierarchy. Mass storage devices generally referred to as archival storage are at the bottom of storage hierarchy. They are cost-effective for storage of very large quantities of data when fast access time is not essential.
Please note two significant points here:
Give difference between compiler and interpreter. Compiler: It is a translator for machine independent HLL as FORTRAN and COBOL etc. Interpreter: It analysis the source
Resource Dependence The parallelism among the instructions may also be affected because of the shared resources. If two instructions are using the related shared resource t
State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,
What are called stalls? An alternative representation of the operation of a pipeline in the case of a cache miss gives the function performed by every pipeline stage in each cl
Define multi programming? Many operating systems are designed to enable the cpu to process a number of independent programs concurrently. This concept is known as multi progra
what is relationship among objects in software engineering??
FTP does not use ? FTP doesn't use User Datagram Protocol.
Q. Illustrate working of Magnetic Bubble Memories? In many materials like garnets on applying magnetic fields certain cylindrical areas whose direction of magnetization is oppo
What are the different parameter passing mechanisms to a function? The different parameter-passing mechanisms are given below: 1. Call by value 2. Call by value-resu
Determine the types of Sensors Different types of sensors are used to give real time information to computers. Frequently, an analogue to digital converter (ADC) is required a
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd