1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
3 years ago
9

Semiconductor memory is used mainly for primary storage even with its high cost. In another hand, the magnetic tape is the cheap

est storage media and it is commonly preferred only as backup storage! Use your own words to discuss how the storage cost, speed and capacity trade-offs can affect the choice of storage media.
Computers and Technology
2 answers:
Genrish500 [490]3 years ago
8 0
<span>Storage costs are a big factor in choosing the type of storage media, especially for larger projects and firms. Tasks that require large backups tend to move to magnetic (tape) memory because of the relatively low cost and high overall storage capacity. However, when working with projects that require faster memory and access that is instantaneous, chip memory, even at the higher cost, is more preferable since it is always accessible.</span>
Zigmanuir [339]3 years ago
3 0

Most types of semiconductor memory have the property of random access,which means that it takes the same amount of time to access any memory location. This means that data can efficiently be accessed in any random order.This contrasts with data storage media such as hard disks and CDs which read and write data consecutively therefore, explains why the data can only be accessed in the same sequence it was written.

Semiconductor memory also has much faster access times than other types of data storage; a byte of data can be written to or read from semiconductor memory within a few nanoseconds, while access time for rotating storage such as hard disks is in the range of milliseconds. For these reasons it is used for main computer memory (primary storage), to hold data the computer is currently working on, among other uses.

Storage costs are a big factor in choosing the type of storage media, especially for larger projects and firms. Tasks that require large backups tend to move to magnetic (tape) memory because of the relatively low cost and high overall storage capacity. However, when working with projects that require faster memory and access that is instantaneous, chip memory, even at a higher cost, is more preferable since it is always accessible.



You might be interested in
What is the best use of a line chart?
lapo4ka [179]
Line graphs can also be used to compare changes over the same period of time for more than one group. Pie charts are best to use when you are trying to compare parts of a whole. They do not show changes over time. Bar graphs are used to compare things between different groups or to track changes over time.
3 0
3 years ago
Accenture has put together a coalition of several ecosystem partners to implement the principles of blockchain and Multi-party S
lutik1710 [3]

Answer:

They include;

1. MAAG Pump Systems,

2. Automatik Plastics Machinery,

3. Gala Industries,

4. Reduction Engineering Scheer,

5. Ettlinger Kunststoffmaschinen and

6. XanTec EDV- und Steuerungstechnik

Explanation:

The MAAG group consists of six companies specialized in different aspects of polymer production. They provide their services to petrochemical, pharmaceutical and food production companies. They produce pellets, gear pumps, filtration systems and components, pelletizers, etc.

They have more than 1000 staff and their offices are located in about 11 countries of the world.

8 0
3 years ago
What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
Marat540 [252]

The definition of pseudocode is that; A: A way of describing a set of instructions in text form using plain English

<h3>What is Pseudocode? </h3>

In computer science, pseudocode is defined as a plain language description of the steps in an algorithm or another system.

Now, the way Pseudocode works is that it often makes use of structural conventions of a normal programming language to be utilized for human reading instead of machine reading.

Pseudocode usually omits details that are essential for machine understanding of the algorithm, such as variable declarations and language-specific code.

Read more about Pseudocode at; brainly.com/question/11623795

8 0
3 years ago
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
Write a script that creates a user-defined database role named paymententry in the ap database. give update permission to the ne
Kazeer [188]

Answer:

USE AP CREATE ROLE PaymentEntry

GRANT UPDATE, DELETE ON Invoices TO PaymentEntry

GRANT UPDATE, INSERT ON InvoiceLineItems TO PaymentEntry

EXEC sp_AddRoleMember db_datareader, PaymentEntry

7 0
2 years ago
Other questions:
  • You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con
    8·1 answer
  • Number of byte required to store illumination
    13·1 answer
  • Which information technology job has the lowest predicted 10-year growth? computer programmer software developer computer suppor
    13·1 answer
  • Which entity might hire a computer systems analyst to help catch criminals?
    14·2 answers
  • How does the post process alert the user if it detects a hardware problem during the post process?
    6·1 answer
  • What is hardware?
    10·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users
    6·1 answer
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
  • You are looking for a computer to provide a central location for online game play. What kind of computer do you need
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!