1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
8

(--BRAINLIEST--)Explain the types of secondary memory on the basis of data access.​

Computers and Technology
2 answers:
Nina [5.8K]3 years ago
8 0

There are two types of secondary memories.

  1. RAM
  2. ROM

RAM:

  • RAM stands for random access memory .
  • It is expandable.
  • we can do multiple things in it.
  • Its erasable.

ROM

  • ROM stands for read only memory.
  • It is permanent .
  • We can only read in it.
  • Its permanent hence not removable.
arlik [135]3 years ago
3 0

Answer:

<u>T</u><u>h</u><u>e</u><u> </u><u>t</u><u>y</u><u>p</u><u>e</u><u>s</u><u> </u><u>o</u><u>f</u><u> </u><u>s</u><u>e</u><u>c</u><u>o</u><u>n</u><u>d</u><u>a</u><u>r</u><u>y</u><u> </u><u>m</u><u>e</u><u>m</u><u>o</u><u>r</u><u>y</u><u> </u><u>o</u><u>n</u><u> </u><u>t</u><u>h</u><u>e</u><u> </u><u>b</u><u>a</u><u>s</u><u>i</u><u>s</u><u> </u><u>o</u><u>f</u><u> </u><u>d</u><u>a</u><u>t</u><u>a</u><u> </u><u>a</u><u>c</u><u>e</u><u>s</u><u>s</u><u> </u><u>a</u><u>r</u><u>e</u><u>:</u>

  1. Magnetic tape: magnetic tape is one of the most popular sequentially accessible storage mediums for large data. It is device used for storing back up information. It is made up of Mylar plastic coated with iron oxide on only one side of tape Data is stored in frames across the width of the tape. It is a serial access type storage ever having low cost and has large storage capacity. When a large volume of information is to be processed sequentially it can be stored on magnetic tape, They are durable, can be written, erased, and re written.
  2. Magnetic disk: Magnetic storage devices refer to system that keeps information or data is magnetized material. In this technology data is stored and read with the help of magnetic properties developed while applying electricity on a magnetized medium Magnetic storage offers high storage capacity, reliability and be capacity to directly accessing data. Magnetic disk holds more data in small place and attains faster data access speed. Data can be accessed randomly from magnetic disk.
  3. Hard disk: Hard disk is the most common secondary storage device for all computers. It is the storage medium within the computer that stores large amount of data and provides relative quick access to that data. A hard disk uses and flat aluminum disk called platters. These platters are coated with a special iron oxide or ferric mode material on both sides to store data in the form of magnetic patterns. Platters are mounted by cutting a hole in the centre and stacking them onto a spindle.
  4. Zip disk:They are high capacity removable disk and drive. They have the speed and capacity of hard disk and portability of floppy disk. Zip disk are of the same size as floppy disk, that is:3-½ inch but have a much higher capacity than the floppy disk, Zip disk and drive were made by Iomega Corp. It comes as a complete unit disk, drive, connection cable, power cord and operating system. It can be connected to the computer system externally using a parallel chord or SCSI cable. Their capacity ranges from 100 MB to 750 MB. They can be used to store large files, audio and video data
  5. Flash memory: Flash memory is a long-life and non-volatile storage chip that is widely used in embedded systems. It can keep stored data and information even when the power is off. It can be electrically erased and reprogrammed.
You might be interested in
There is the Iphone MAX, Iphone XR and Iphone XS. which iphone is the very NEWEST and which one do you recommend? explain.
Pavlova-9 [17]

Answer:me myself would go with the Iphone XR

Explanation:

Because its like a combined phone of those two phones together and its not as exspnsive as the other phones and overall its good cause i have had it since it came out and had no problems with it.

3 0
3 years ago
Read 2 more answers
Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to
mihalych1998 [28]

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

7 0
3 years ago
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
2 years ago
Which is a sentence fragment?
ehidna [41]
C is a sentence fragment it does not have a verb
5 0
3 years ago
Resolution has the most impact on the size of photo print you can make.
siniylev [52]
If you want the best possible print, you need to upload the best quality digital file. Sometimes photos might look just fine when you look at them on your computer screen, and you might wonder what’s up with us when we say we can’t print them. Photos that don’t have sufficient resolution will look all blurry and pixilated (blocky with jagged edges) when printed.
3 0
4 years ago
Other questions:
  • Which of the following operations would best allow you to place 3D building models at their proper height on the terrain (e.g.,
    8·1 answer
  • Select the focus questions that emphasizes what is more important: (Select all that apply) a.What needs to be relegated to the b
    8·1 answer
  • How do I center images in HTML. Also I need to have one image lay over another. How do I do this in HTML?
    11·1 answer
  • You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a cal
    10·1 answer
  • Which of the following lines of code is syntactically correct?
    14·1 answer
  • 2 Manter o autocontrole nos ajuda a evitar muitos problemas na nossa vida pessoal e no ambiente profissional. Em se tratando de
    14·1 answer
  • The sequence's insert member function normally puts a new item before the current item. What should insert do if there is no cur
    9·1 answer
  • ¿Es aquel panel que controla la estructura de la tabla dinámica?
    14·2 answers
  • PLZZZZZZZZZZ HELP ME OUT THIS DUE TODAY AND NEED SOMEONE HELP!!!!!plzzzzzzzzzzz i begging you!!!
    11·1 answer
  • 3) The director tells you to truck left, you must:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!