1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
8

(--BRAINLIEST--)Explain the types of secondary memory on the basis of data access.​

Computers and Technology
2 answers:
Nina [5.8K]3 years ago
8 0

There are two types of secondary memories.

  1. RAM
  2. ROM

RAM:

  • RAM stands for random access memory .
  • It is expandable.
  • we can do multiple things in it.
  • Its erasable.

ROM

  • ROM stands for read only memory.
  • It is permanent .
  • We can only read in it.
  • Its permanent hence not removable.
arlik [135]3 years ago
3 0

Answer:

<u>T</u><u>h</u><u>e</u><u> </u><u>t</u><u>y</u><u>p</u><u>e</u><u>s</u><u> </u><u>o</u><u>f</u><u> </u><u>s</u><u>e</u><u>c</u><u>o</u><u>n</u><u>d</u><u>a</u><u>r</u><u>y</u><u> </u><u>m</u><u>e</u><u>m</u><u>o</u><u>r</u><u>y</u><u> </u><u>o</u><u>n</u><u> </u><u>t</u><u>h</u><u>e</u><u> </u><u>b</u><u>a</u><u>s</u><u>i</u><u>s</u><u> </u><u>o</u><u>f</u><u> </u><u>d</u><u>a</u><u>t</u><u>a</u><u> </u><u>a</u><u>c</u><u>e</u><u>s</u><u>s</u><u> </u><u>a</u><u>r</u><u>e</u><u>:</u>

  1. Magnetic tape: magnetic tape is one of the most popular sequentially accessible storage mediums for large data. It is device used for storing back up information. It is made up of Mylar plastic coated with iron oxide on only one side of tape Data is stored in frames across the width of the tape. It is a serial access type storage ever having low cost and has large storage capacity. When a large volume of information is to be processed sequentially it can be stored on magnetic tape, They are durable, can be written, erased, and re written.
  2. Magnetic disk: Magnetic storage devices refer to system that keeps information or data is magnetized material. In this technology data is stored and read with the help of magnetic properties developed while applying electricity on a magnetized medium Magnetic storage offers high storage capacity, reliability and be capacity to directly accessing data. Magnetic disk holds more data in small place and attains faster data access speed. Data can be accessed randomly from magnetic disk.
  3. Hard disk: Hard disk is the most common secondary storage device for all computers. It is the storage medium within the computer that stores large amount of data and provides relative quick access to that data. A hard disk uses and flat aluminum disk called platters. These platters are coated with a special iron oxide or ferric mode material on both sides to store data in the form of magnetic patterns. Platters are mounted by cutting a hole in the centre and stacking them onto a spindle.
  4. Zip disk:They are high capacity removable disk and drive. They have the speed and capacity of hard disk and portability of floppy disk. Zip disk are of the same size as floppy disk, that is:3-½ inch but have a much higher capacity than the floppy disk, Zip disk and drive were made by Iomega Corp. It comes as a complete unit disk, drive, connection cable, power cord and operating system. It can be connected to the computer system externally using a parallel chord or SCSI cable. Their capacity ranges from 100 MB to 750 MB. They can be used to store large files, audio and video data
  5. Flash memory: Flash memory is a long-life and non-volatile storage chip that is widely used in embedded systems. It can keep stored data and information even when the power is off. It can be electrically erased and reprogrammed.
You might be interested in
How can a chart help to display your data? How does one choose the best type of chart to use, and how does one ensure that he or
Kay [80]
I think this should be under math. So let's say that you have tons of data and you need to sort it. A chart will help to graph that data in an organized formation.
6 0
3 years ago
Triangle O N M is cut by line segment L K. Line segment L K goes from side N O to side N M. The length of N L is x, the length o
Fantom [35]

Answer:

D) x=8

Explanation:

4 0
3 years ago
Read 2 more answers
Please fill in I give 50 points!!
wariber [46]

Answer:

* explains the whole paragraph what ever that is * there

3 0
2 years ago
Consider a set of mobile computing clients in a certain town who each
poizon [28]

Answer: answer given in the explanation

Explanation:

We have n clients and k-base stations, say each client has to be connected to a base station that is located at a distance say 'r'. now the base stations doesn't have allocation for more than L clients.

To begin, let us produce a network which consists of edges and vertex

Network (N) = (V,E)

where V = [S, cl-l, - - - -  cl-n, bs-l - - - - - - bs-k, t]

given that cl-l, - - - - - cl-n represents nodes for the clients

also we have that bs-l, - - - - - bs-k represents the nodes for base station

Also

E = [ (s, cl-i), (cl-i,bs-j), (bs-j,t)]

(s, cl-i) = have capacity for all cl-i (clients)

(cl-i,bs-j) = have capacity for all cl-i  clients & bs-j (stations)

⇒ using Fond Fulkorson algorithm we  find the max flow in N

⇒ connecting cl-i clients to  bs-j stations

      like (cl-i, bs-j) = 1

   if f(cl-i, bs-j)  = 0

⇒ say any connection were to produce a valid flow, then

if cl-i (clients) connected                f(s,cl-i) = 1 (o otherwise)

if cl-i (clients) connected  to bs-j(stations)   f(cl-i,bs-j) = 1 (o otherwise)

   f(bs-j,t) = no of clients  (cl-i)  connected to bs-j

⇒ on each node, the max flow value (f) is longer than the no of clients that can be connected.

⇒ create the connection between the client and base station i.e. cl-l to base bs-j iff    f(cl-i, bs-j) = 1

⇒ when considering the capacity, we see that any client cannot directly connect to the base stations, and also the base stations cannot handle more than L clients, that is because the load allocated to the base statsion is L.

from this, we say f is the max no of clients (cl-i) that can be connected if we find the max flow, we can thus connect the client to the base stations easily.

cheers i hope this helps

5 0
3 years ago
Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and T
tensa zangetsu [6.8K]

Answer:

All of the above is the correct answer to the given question .

Explanation:

As the Ken olson is the Ken Olson, president of the Digital Equipment Organization . Following are the predictions of  Ken olson of the the technology that are wrong.

  • Lack of creativity regarding the current applications that the user has would consider for the  technology.
  • Lack of creativity regarding the  user or the client has liking.
  • Lack of creativity on what the government would be charging ford. Any of these

So we will choose the Option all these.

8 0
3 years ago
Other questions:
  • When seeking information on the internet about a variety of subjects, the most useful place to look would be
    8·2 answers
  • What does BMP stand for?
    10·2 answers
  • When information about a person remains on the internet indefinitely it is known as?
    6·1 answer
  • A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
    11·1 answer
  • Which are Career and Technical Student Organizations? (Check all that apply.)
    12·1 answer
  • Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
    12·1 answer
  • While your hands are on home row, your left hand rests lightly on _____.
    13·2 answers
  • GIVING BRAINLIEST Jenna creates advertisements for companies to air on television. Which file format will best preserve the grap
    5·2 answers
  • Hey everyone please let my friends answer please?????? .
    12·2 answers
  • Who are all the fnaf characters?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!