1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
9

Briefly describe the function of storage media

Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
4 0

Answer:

In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve electronic data. It refers to a physical device or component in a computing system that receives and retains information relating to applications and users. The plural form of this term is storage media.

Early forms of storage media included computer paper tape. Holes punched in the paper corresponded to a single bit of data. A paper tape reader would interpret each punched hole and convert it to a number. Paper tape was supplanted by magnetic tape, which eventually evolved to magnetic floppy disk.

How storage media works:

Media used in computer storage receive messages in the form of data, via software commands from the computer system. The commands determine the type of storage media needed to hold the data, based on its business value, compliance implications or other factors. In tiered storage, data is moved among disk, flash and cloud storage based on automated software policies.

A storage medium may be internal to a computing device, such as a computer's hard drive, or a removable device such as an external hard drive or universal serial bus (USB) flash drive. There are various types of storage media, including magnetic tape, nonvolatile memory cards, rotating fixed disk and solid-state drives (SSDs), which are based on nonvolatile flash memory.

The term storage encompasses all data, and can be either primary or secondary storage. Primary storage refers to data that is kept in memory for fast retrieval by a computer's processor. Secondary storage is data placed on hard disk or tape to ensure backup and long-term retention.

A storage device may be a type of storage media, or a piece of storage hardware outfitted with storage media. For example, storage arrays decouple storage media from servers. Storage arrays incorporate electromechanical hard disk drives (HDDs), SSDs or a combination of each, attached to separate servers and networking.

Storage media can be arranged for access in many ways. Some well-known arrangements include:

redundant array of independent disks (RAID);

network-attached storage (NAS); and

storage area network (SAN).

SAN arrays initially were designed with HDDs, until the advent of all-flash arrays outfitted solely with SSDs. Hybrid flash arrays blend the two storage media in an integrated system, with disk providing a capacity tier alongside a faster tier of flash.

Explanation:

please mark me as brainliest

You might be interested in
Sorry but, what are brainliest for?
Advocard [28]

Answer:

smartest and accurate answer

Explanation:

5 0
3 years ago
Read 2 more answers
Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
sdas [7]

Solution:

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the bits per seconds.

Thus this is the required answer.

6 0
3 years ago
Question: 11
levacccp [35]

Answer:

The detail answer to this question is given in the explanation section.

The correct answer is .info

Explanation:

Let look as each statement

p.info.important

this is a specific  because it says

go to important property which is inside info property  which is inside P

.info  is less specific

because it will go to .info No function is  given whose property is this.

p.info

This is some what specific. As it says select .info property which is inside p

4 0
3 years ago
Which is true about TCP and UDP? Choose two answers.
vichka [17]

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

7 0
3 years ago
What should you do when you are working on an unclassified system and receive an email.
koban [17]

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

3 0
2 years ago
Other questions:
  • Write an interactive Python calculator program. The program should allow the user to type a mathematical expression, and then pr
    13·1 answer
  • What is the best reason to delete Internet browsing history on a regular basis? to solve a computer hardware problem to protect
    13·2 answers
  • But this time use 16 kib pages instead of 4 kib pages. what would be some of the advantages of having a larger page size? what a
    11·1 answer
  • Who has access to the source code of proprietary software
    6·1 answer
  • You are given 6 training examples for a binary classification problem as follows:
    12·1 answer
  • Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
    11·2 answers
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up a
    6·1 answer
  • Write a static method called split that takes an ArrayList of integer values as a parameter and that replaces each value in the
    12·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!