SlideShare a Scribd company logo
Data Storage
Data Storage

The storage unit of a computer system is ranked
  according to the following criteria:
• Access Time – time required to retrieve
  data.
• Storage Capacity – amount of data that can
  be stored in storage unit.
• Cost/bit of storage – the goal is to
  minimise the cost
Storage Devices
• The device which stores the data in a
  computer.

• Also known as memory.

• It is of two types –

  • Primary memory/storage device
  • Secondary memory/storage device
Primary Storage


• Also known as memory.

• It is of two types –

  • Primary memory/storage
  • Secondary memory/storage
Storage Types

Why storage is required by computer?
Computer storage can be classified into following types:
 Primary Storage
    >> RAM (Random Access Memory)
    >> ROM (Read only Memory)
 Secondary Storage
    >> Floppy Disk
    >> Hard Disk
    >> CD (Compact Disk)
    >> DVD (Digital Versatile Disk)
Primary Storage

• Random Access Memory (RAM)
• Basic to all computers.
• In the form of integrated circuits that allow the
  stored data to be accessed in any order i.e. at
  random and without the physical movement of the
  storage medium or a physical reading head.
• Made up of several small parts known as cells.
• Each cell can store a fixed no. of bits.
• Each cell has a unique no. assigned to it which is
  known as address of cell.
Primary Storage

•Also known as Read/Write memory.
•Volatile in nature.
•Usually it is known as memory of computer.
Types of RAM
There are two basic types of RAM:
• Dynamic RAM (DRAM) - The term dynamic indicates that
   the memory must be constantly refreshed or it will lose its
   contents.
• Static RAM (SRAM) –
   • Faster and more reliable than DRAM.
   • The term static is derived from the fact that it doesn't
      need to be refreshed like dynamic RAM.
   • It can give access times as low as 10 nanoseconds.
   • Much more expensive than DRAM.
   • Due to its high cost, SRAM is often used only as a
      memory cache.
   • Cache memory - a special high-speed storage
      mechanism. It can be either a reserved section of main
      memory or an independent high-speed storage device.
Other Types of RAM
Other than the above basic types of RAM, there are few more newer
   versions –
• FPM DRAM: Fast Page Mode DRAM, maximum data transfer rate is 176
   mbps.
• EDO DRAM: Extended data-out DRAM, maximum data transfer rate is
   264 mbps.
• SDRAM: Synchronous Dynamic RAM, maximum data transfer rate is 528
   mbps.
• DDR SDRAM: Double Data Rate SDRAM, maximum data transfer rate is
   1064 mbps.
• DDR2 SDRAM : New version of DDR RAM with higher clock frequencies.
• RDRAM: Rambus DRAM, used for a special high speed data bus called
   Rambus channel. Maximum data transfer rate is 1600 mbps.
• Credit Card Memory: A proprietary self contained DRAM memory
   module that plugs into a special slot for use in notebooks.
• PCMCIA Memory Card: Self contained DRAM memory module that
   plugs into a special slot for use in notebooks. It is not a proprietary and
   works with any notebook.
Primary Storage
1. Read Only Memory(ROM) :
• Computer memory on which data has been prerecorded.
• Information is permanently stored i.e. data stored in ROM
   cannot be modified, hence known as ROM.
• Non volatile in nature.
• Stores critical programs such as the program that boots the
   computer.
• Used extensively in calculators and peripheral devices such
   as laser printers, whose fonts are often stored in ROMs.
Types of ROM:
8. Programmable Read-Only Memory (PROM) –
   • One-time programmable ROM (OTP), can be
       programmed through a special device called a PROM
       programmer.
   • PROM can only be programmed once.
Primary Storage
1. Erasable programmable Read-Only Memory (EPROM):
   • Can be erased by exposure to strong ultraviolet light, then
      rewritten.
   • Repeated exposure to UV light will eventually wear out an
      EPROM.
   • Some EPROM chips are factory-programmed before they
      are packaged; these are effectively PROM.
• Electrically erasable programmable Read-Only Memory
   (EEPROM)
   • Based on a similar semiconductor structure to EPROM, but
      allows its entire contents to be electrically erased, then
      rewritten electrically, so that they need not be removed
      from the computer.
   • Used in camera, MP3 player, etc.
   • Writing or flashing an EEPROM is much slower.
Primary Storage
•  Electrically Alterable Read-Only Memory (EAROM):
   • A type of EEPROM that can be modified one bit at a time.
   • Writing is a very slow process and again requires higher
      voltage.
   • intended for applications that require infrequent and only
      partial rewriting.
2. Flash memory (or simply flash)
   • A modern type of EEPROM invented in 1984.
   • Flash memory can be erased and rewritten faster than
      ordinary EEPROM.
   • Modern NAND flash makes efficient use of silicon chip area.
   • Is sometimes called flash ROM or flash EEPROM when used
      as a replacement for older ROM types.
ROM
Difference between RAM and ROM

          RAM                         ROM
•   RAM stands for          •   ROM stands for Read
    Random Access               only Memory
    Memory
                            •   It is non-volatile in
•   It is volatile in           nature. Its contents
    nature. Its contents        are non erased when
    are erased when             power is turned off.
    power is turned off.
                            •   We can only read
•   We can read as well         this memory and
    as write through this       cannot write through
    memory                      it
Secondary Storage
Secondary Storage

The storage capacity of primary storage is not sufficient to
   store large volume of data, hence, additional memory is
   used, known as secondary memory/storage.
Two methods of accessing data –

4. Sequential Access:
   Data can be retrieved in same sequence in which it is
      stored.

5. Direct Access:
   Data can be accessed directly eg. Computerised Airline
      ticket booking system
Types of Secondary Storage
1. Magnetic Tape:
   • Data is sequentially access and retrieved .
   • Made up of plastic ribbon, half inch wide, one side
     coated with an iron oxide material.
   • Ribbon is stored in reels of 50 to 2400 feet or a small
     cartridge.
   • Unlimited storage
   • High data density
   • Low cost
   • Rapid transfer rate
   • Ease of handling
   • Portable
   BUT
   • No direct access
   • Environmental problems
Types of Secondary Storage
1. Magnetic Disk:
   • Contains a thin metal plate, coated on both sides with a
     magnetic material.
   • A disk pack consists of a no. of disks, mounted about
     half inch apart from each other on a central shaft which
     rotates at the speed of 2400or more rpm.
   • Information is stored on both sides.
   • Each disk consists of a no. of invisible concentric circles
     called Tracks.
   • A set of corresponding tracks in all the surfaces is called
     a cylinder.
   • Each track is subdivided into sectors.
   • Information is recorded on track and can be read using
     read/write heads.
Storage Types

   1. Floppy Disk
                                           0
                                0                         Sectors
                                1
                                2
    Tracks

                                                      1



                                                      File address contains
                                                      information about
                                                      track and sector of
                                               2      file.
•Surface of floppy disk is coated with magnetic material.
• Data is stored on the surface of disk by magnetizing the surface.
•That’s why FD is called magnetic storage device.
Floppy Disk
•Formatting a floppy disk means creating tracks and sectors on the disk
surface.
•   Data is stored in files in floppy disk.
•   Storage capacity is 1.44 MB.
•   Each file has a size and location where it is stored in the floppy disk.
•   In order to locate a particular file, FAT (File Allocation Table) is
    maintained:
FAT contains:
    1. Name of file
    2. Size of file
    3. Location on disk (Starting Track and Sector)
    4. Date created
    5. Attributes such as Read Only, Hidden, etc.
Hard Disk

      Read Write                                   Cylinder (same track of all disks)
      Heads
                                                             Disk 0

                                                             Disk 1

                                                             Disk 2

                                                             Disk 3

                                                             Disk 4




File address contains information about disk, cylinder and sector of file.
HD is also a magnetic storage device.
Storage capacity of HD ranges from GBs to TBs.
Optical Disk
• An optical disc is an electronic data storage medium that can
  be written to and read using a low-powered laser beam.
• An optical disc holds much more data.
• Consist of rotating disk coated with a highly reflective
  material.
• A laser beam is focussed on the surface of disk.
• There is one spiral track on the disk surface.
• When the laser beam is turned on, it creates a small hole on
  the surface of the disk along its track while writing the data,
  known as pit.
• The surface of the disk is plane in the absence of data,
  known as crater.
• Storage capacity is higher.
Optical Disk
      1. Compact Disk:
      CD is an optical storage device.
      In order to store the information, on the surface of CD, the surface is
      burned accordingly. That’s why writing a CD is also called burning a
      CD.
      Once written, the content of CD can’t be changed.
Stored bits

     0
     1
     1
     0             Burned places      Read Head throws a beam of light on the
     1                                surface and senses the reflected light. If
     0                                the beam reflects it indicates that 1 is
     0                                stored otherwise 0 is stored. Range of
     1               Disk surface
                                      data storage is 650/700 MB.
Digital Versatile Disk

    DVD ("Digital Versatile Disc" or "Digital Video Disc"):
•   A popular optical disc storage media format that can be used
    for data storage.
•   Including movies with high video and sound quality.
•   DVDs resemble CDs.
•   A DVD reader or writer can usually read CDs, but DVDs are
    encoded in a different format of much greater density,
    allowing a data storage capacity 8 times greater.
•   Range of storage capacity is from 2.8 Gigabytes to 4.7
    Gigabytes.
Memory Measurement




Device        Common available storage capacity
Floppy Disk   1.44 MB
Hard Disk     10 GB, 20 GB, 40 GB, 80 GB
CD            650/700 MB
DVD           2.8 – 4.7 GB
Data Representation
Data Representation

Data: raw facts, inserted into the computer to be processed. eg
   typing the alphabets through keyboard – G, O, D
Information: processed data or output given by computer. eg
   the word GOD displayed on monitor.

Types of Representation of Data

•   Internal Representation: values used by computer to
    store and process data.
•   External Representation: Computer translates data into
    the form of human understandable language of numbers,
    characters, figures and sound etc.
Data Representation

Bit: A bit refers to one binary digit. Either 0 or 1.
Byte: Set of 8 bits is called byte. i.e. 1Byte = 8 Bits
Word: It is a collection of 2 bytes or 4 bytes depending on
the word size of computer, whether it is 16 bit computer or 32
bit computer
1024 bytes = 1Kilo Bytes
1024 KB = 1 Mega Bytes
1024 MB = 1 Giga Bytes

More Related Content

What's hot

Presentation of the big external memory
Presentation of the big external memoryPresentation of the big external memory
Presentation of the big external memory
Luis Fernando
 
External memory
External memoryExternal memory
External memory
Er Girdhari Lal Kumawat
 
Secondary storage devices
Secondary storage devices Secondary storage devices
Secondary storage devices
Slideshare
 
Storage devices
Storage devicesStorage devices
Storage devices
GNag R'Varma
 
External memory - Computer Architecture
External memory - Computer ArchitectureExternal memory - Computer Architecture
External memory - Computer Architecture
Bretz Harllynne Moltio
 
COMPUTER MEMORY BBA
COMPUTER MEMORY BBA COMPUTER MEMORY BBA
COMPUTER MEMORY BBA
MANAV KUMAR
 
Csc1401 lecture07 -external memory
Csc1401   lecture07 -external memoryCsc1401   lecture07 -external memory
Csc1401 lecture07 -external memory
IIUM
 
Storage Devices
Storage DevicesStorage Devices
Storage Devices
Pinky
 
Computer storage
Computer storageComputer storage
Computer storage
Jerome Luison
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
University of Potsdam
 
Presentation on computer data storage
Presentation on computer data storage Presentation on computer data storage
Presentation on computer data storage
GLG
 
06 External Memory
06  External  Memory06  External  Memory
06 External Memory
Jeanie Delos Arcos
 
Storage Devices PPt For class 9
Storage Devices PPt For class 9Storage Devices PPt For class 9
Storage Devices PPt For class 9
Saurabh Singh
 
Auxiliary memory
Auxiliary memoryAuxiliary memory
Auxiliary memory
YuvrajVyas2
 
Storage and memory devices
Storage and memory devicesStorage and memory devices
Storage and memory devices
Hassaan13
 
Memory devices
Memory devicesMemory devices
Memory devices
RAMESHBABUA3
 
Secondary Memory
Secondary MemorySecondary Memory
Secondary Memory
Himanshu Gupta
 
OSCh14
OSCh14OSCh14
memory unit
 memory unit memory unit
memory unit
Neha Kurale
 
Storage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastavaStorage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastava
Abhishek Srivastava
 

What's hot (20)

Presentation of the big external memory
Presentation of the big external memoryPresentation of the big external memory
Presentation of the big external memory
 
External memory
External memoryExternal memory
External memory
 
Secondary storage devices
Secondary storage devices Secondary storage devices
Secondary storage devices
 
Storage devices
Storage devicesStorage devices
Storage devices
 
External memory - Computer Architecture
External memory - Computer ArchitectureExternal memory - Computer Architecture
External memory - Computer Architecture
 
COMPUTER MEMORY BBA
COMPUTER MEMORY BBA COMPUTER MEMORY BBA
COMPUTER MEMORY BBA
 
Csc1401 lecture07 -external memory
Csc1401   lecture07 -external memoryCsc1401   lecture07 -external memory
Csc1401 lecture07 -external memory
 
Storage Devices
Storage DevicesStorage Devices
Storage Devices
 
Computer storage
Computer storageComputer storage
Computer storage
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
Presentation on computer data storage
Presentation on computer data storage Presentation on computer data storage
Presentation on computer data storage
 
06 External Memory
06  External  Memory06  External  Memory
06 External Memory
 
Storage Devices PPt For class 9
Storage Devices PPt For class 9Storage Devices PPt For class 9
Storage Devices PPt For class 9
 
Auxiliary memory
Auxiliary memoryAuxiliary memory
Auxiliary memory
 
Storage and memory devices
Storage and memory devicesStorage and memory devices
Storage and memory devices
 
Memory devices
Memory devicesMemory devices
Memory devices
 
Secondary Memory
Secondary MemorySecondary Memory
Secondary Memory
 
OSCh14
OSCh14OSCh14
OSCh14
 
memory unit
 memory unit memory unit
memory unit
 
Storage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastavaStorage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastava
 

Similar to Datastorage

Types of memory (bba 1st)
Types of memory (bba 1st)Types of memory (bba 1st)
Types of memory (bba 1st)
basitnazir
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf
JESUNPK
 
Backing storage
Backing storageBacking storage
Backing storage
missstevenson01
 
Memory types
Memory typesMemory types
Memory types
Piyush Rochwani
 
Memory
MemoryMemory
Types of Storage Devices
Types of  Storage DevicesTypes of  Storage Devices
Types of Storage Devices
Maryam Fida
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
PravinGhosekar
 
Storage Technologies
Storage TechnologiesStorage Technologies
Storage Technologies
Rishav Bhurtel
 
Memory.ppt
Memory.pptMemory.ppt
Memory devices copy
Memory devices   copyMemory devices   copy
Memory devices copy
venkateshp100
 
MEMORY.pptx
MEMORY.pptxMEMORY.pptx
Secondary Storage Devices
Secondary Storage DevicesSecondary Storage Devices
BAIT1003 Chapter 5
BAIT1003 Chapter 5BAIT1003 Chapter 5
BAIT1003 Chapter 5
limsh
 
RAM&&ROM.ppt
RAM&&ROM.pptRAM&&ROM.ppt
RAM&&ROM.ppt
senthilvelanrajagopa2
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
Tapan Khilar
 
Compsystem2
Compsystem2Compsystem2
Compsystem2
Sajib
 
DIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICESDIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICES
Staus Nyongesa
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
ThamizhselviKrishnam
 
Computer memory
Computer memoryComputer memory
Computer memory
Xấu Điên
 
MDFH_Session6 (1)_hayes _ chapter 6 SE 222
MDFH_Session6 (1)_hayes _ chapter 6 SE 222MDFH_Session6 (1)_hayes _ chapter 6 SE 222
MDFH_Session6 (1)_hayes _ chapter 6 SE 222
tabeh82816
 

Similar to Datastorage (20)

Types of memory (bba 1st)
Types of memory (bba 1st)Types of memory (bba 1st)
Types of memory (bba 1st)
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf
 
Backing storage
Backing storageBacking storage
Backing storage
 
Memory types
Memory typesMemory types
Memory types
 
Memory
MemoryMemory
Memory
 
Types of Storage Devices
Types of  Storage DevicesTypes of  Storage Devices
Types of Storage Devices
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Storage Technologies
Storage TechnologiesStorage Technologies
Storage Technologies
 
Memory.ppt
Memory.pptMemory.ppt
Memory.ppt
 
Memory devices copy
Memory devices   copyMemory devices   copy
Memory devices copy
 
MEMORY.pptx
MEMORY.pptxMEMORY.pptx
MEMORY.pptx
 
Secondary Storage Devices
Secondary Storage DevicesSecondary Storage Devices
Secondary Storage Devices
 
BAIT1003 Chapter 5
BAIT1003 Chapter 5BAIT1003 Chapter 5
BAIT1003 Chapter 5
 
RAM&&ROM.ppt
RAM&&ROM.pptRAM&&ROM.ppt
RAM&&ROM.ppt
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
Compsystem2
Compsystem2Compsystem2
Compsystem2
 
DIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICESDIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICES
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
 
Computer memory
Computer memoryComputer memory
Computer memory
 
MDFH_Session6 (1)_hayes _ chapter 6 SE 222
MDFH_Session6 (1)_hayes _ chapter 6 SE 222MDFH_Session6 (1)_hayes _ chapter 6 SE 222
MDFH_Session6 (1)_hayes _ chapter 6 SE 222
 

More from Anshumali Singh

Unit3rd
Unit3rdUnit3rd
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
Anshumali Singh
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
Anshumali Singh
 
Unit2.2
Unit2.2Unit2.2
Unit2.1
Unit2.1Unit2.1
Unit2.1
Unit2.1Unit2.1
Unit2(Cont.)
Unit2(Cont.)Unit2(Cont.)
Unit2(Cont.)
Anshumali Singh
 
Unit2
Unit2Unit2
Shai 2
Shai 2Shai 2
Shai
ShaiShai
Outputdevice
OutputdeviceOutputdevice
Outputdevice
Anshumali Singh
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
Anshumali Singh
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
Anshumali Singh
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
Anshumali Singh
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Anshumali Singh
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
Anshumali Singh
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
Anshumali Singh
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
Anshumali Singh
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Anshumali Singh
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Anshumali Singh
 

More from Anshumali Singh (20)

Unit3rd
Unit3rdUnit3rd
Unit3rd
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Unit2(Cont.)
Unit2(Cont.)Unit2(Cont.)
Unit2(Cont.)
 
Unit2
Unit2Unit2
Unit2
 
Shai 2
Shai 2Shai 2
Shai 2
 
Shai
ShaiShai
Shai
 
Outputdevice
OutputdeviceOutputdevice
Outputdevice
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Datastorage

  • 2. Data Storage The storage unit of a computer system is ranked according to the following criteria: • Access Time – time required to retrieve data. • Storage Capacity – amount of data that can be stored in storage unit. • Cost/bit of storage – the goal is to minimise the cost
  • 3. Storage Devices • The device which stores the data in a computer. • Also known as memory. • It is of two types – • Primary memory/storage device • Secondary memory/storage device
  • 4. Primary Storage • Also known as memory. • It is of two types – • Primary memory/storage • Secondary memory/storage
  • 5. Storage Types Why storage is required by computer? Computer storage can be classified into following types:  Primary Storage >> RAM (Random Access Memory) >> ROM (Read only Memory)  Secondary Storage >> Floppy Disk >> Hard Disk >> CD (Compact Disk) >> DVD (Digital Versatile Disk)
  • 6. Primary Storage • Random Access Memory (RAM) • Basic to all computers. • In the form of integrated circuits that allow the stored data to be accessed in any order i.e. at random and without the physical movement of the storage medium or a physical reading head. • Made up of several small parts known as cells. • Each cell can store a fixed no. of bits. • Each cell has a unique no. assigned to it which is known as address of cell.
  • 7. Primary Storage •Also known as Read/Write memory. •Volatile in nature. •Usually it is known as memory of computer.
  • 8. Types of RAM There are two basic types of RAM: • Dynamic RAM (DRAM) - The term dynamic indicates that the memory must be constantly refreshed or it will lose its contents. • Static RAM (SRAM) – • Faster and more reliable than DRAM. • The term static is derived from the fact that it doesn't need to be refreshed like dynamic RAM. • It can give access times as low as 10 nanoseconds. • Much more expensive than DRAM. • Due to its high cost, SRAM is often used only as a memory cache. • Cache memory - a special high-speed storage mechanism. It can be either a reserved section of main memory or an independent high-speed storage device.
  • 9. Other Types of RAM Other than the above basic types of RAM, there are few more newer versions – • FPM DRAM: Fast Page Mode DRAM, maximum data transfer rate is 176 mbps. • EDO DRAM: Extended data-out DRAM, maximum data transfer rate is 264 mbps. • SDRAM: Synchronous Dynamic RAM, maximum data transfer rate is 528 mbps. • DDR SDRAM: Double Data Rate SDRAM, maximum data transfer rate is 1064 mbps. • DDR2 SDRAM : New version of DDR RAM with higher clock frequencies. • RDRAM: Rambus DRAM, used for a special high speed data bus called Rambus channel. Maximum data transfer rate is 1600 mbps. • Credit Card Memory: A proprietary self contained DRAM memory module that plugs into a special slot for use in notebooks. • PCMCIA Memory Card: Self contained DRAM memory module that plugs into a special slot for use in notebooks. It is not a proprietary and works with any notebook.
  • 10. Primary Storage 1. Read Only Memory(ROM) : • Computer memory on which data has been prerecorded. • Information is permanently stored i.e. data stored in ROM cannot be modified, hence known as ROM. • Non volatile in nature. • Stores critical programs such as the program that boots the computer. • Used extensively in calculators and peripheral devices such as laser printers, whose fonts are often stored in ROMs. Types of ROM: 8. Programmable Read-Only Memory (PROM) – • One-time programmable ROM (OTP), can be programmed through a special device called a PROM programmer. • PROM can only be programmed once.
  • 11. Primary Storage 1. Erasable programmable Read-Only Memory (EPROM): • Can be erased by exposure to strong ultraviolet light, then rewritten. • Repeated exposure to UV light will eventually wear out an EPROM. • Some EPROM chips are factory-programmed before they are packaged; these are effectively PROM. • Electrically erasable programmable Read-Only Memory (EEPROM) • Based on a similar semiconductor structure to EPROM, but allows its entire contents to be electrically erased, then rewritten electrically, so that they need not be removed from the computer. • Used in camera, MP3 player, etc. • Writing or flashing an EEPROM is much slower.
  • 12. Primary Storage • Electrically Alterable Read-Only Memory (EAROM): • A type of EEPROM that can be modified one bit at a time. • Writing is a very slow process and again requires higher voltage. • intended for applications that require infrequent and only partial rewriting. 2. Flash memory (or simply flash) • A modern type of EEPROM invented in 1984. • Flash memory can be erased and rewritten faster than ordinary EEPROM. • Modern NAND flash makes efficient use of silicon chip area. • Is sometimes called flash ROM or flash EEPROM when used as a replacement for older ROM types.
  • 13. ROM
  • 14. Difference between RAM and ROM RAM ROM • RAM stands for • ROM stands for Read Random Access only Memory Memory • It is non-volatile in • It is volatile in nature. Its contents nature. Its contents are non erased when are erased when power is turned off. power is turned off. • We can only read • We can read as well this memory and as write through this cannot write through memory it
  • 16. Secondary Storage The storage capacity of primary storage is not sufficient to store large volume of data, hence, additional memory is used, known as secondary memory/storage. Two methods of accessing data – 4. Sequential Access: Data can be retrieved in same sequence in which it is stored. 5. Direct Access: Data can be accessed directly eg. Computerised Airline ticket booking system
  • 17. Types of Secondary Storage 1. Magnetic Tape: • Data is sequentially access and retrieved . • Made up of plastic ribbon, half inch wide, one side coated with an iron oxide material. • Ribbon is stored in reels of 50 to 2400 feet or a small cartridge. • Unlimited storage • High data density • Low cost • Rapid transfer rate • Ease of handling • Portable BUT • No direct access • Environmental problems
  • 18. Types of Secondary Storage 1. Magnetic Disk: • Contains a thin metal plate, coated on both sides with a magnetic material. • A disk pack consists of a no. of disks, mounted about half inch apart from each other on a central shaft which rotates at the speed of 2400or more rpm. • Information is stored on both sides. • Each disk consists of a no. of invisible concentric circles called Tracks. • A set of corresponding tracks in all the surfaces is called a cylinder. • Each track is subdivided into sectors. • Information is recorded on track and can be read using read/write heads.
  • 19. Storage Types 1. Floppy Disk 0 0 Sectors 1 2 Tracks 1 File address contains information about track and sector of 2 file. •Surface of floppy disk is coated with magnetic material. • Data is stored on the surface of disk by magnetizing the surface. •That’s why FD is called magnetic storage device.
  • 20. Floppy Disk •Formatting a floppy disk means creating tracks and sectors on the disk surface. • Data is stored in files in floppy disk. • Storage capacity is 1.44 MB. • Each file has a size and location where it is stored in the floppy disk. • In order to locate a particular file, FAT (File Allocation Table) is maintained: FAT contains: 1. Name of file 2. Size of file 3. Location on disk (Starting Track and Sector) 4. Date created 5. Attributes such as Read Only, Hidden, etc.
  • 21. Hard Disk Read Write Cylinder (same track of all disks) Heads Disk 0 Disk 1 Disk 2 Disk 3 Disk 4 File address contains information about disk, cylinder and sector of file. HD is also a magnetic storage device. Storage capacity of HD ranges from GBs to TBs.
  • 22. Optical Disk • An optical disc is an electronic data storage medium that can be written to and read using a low-powered laser beam. • An optical disc holds much more data. • Consist of rotating disk coated with a highly reflective material. • A laser beam is focussed on the surface of disk. • There is one spiral track on the disk surface. • When the laser beam is turned on, it creates a small hole on the surface of the disk along its track while writing the data, known as pit. • The surface of the disk is plane in the absence of data, known as crater. • Storage capacity is higher.
  • 23. Optical Disk 1. Compact Disk: CD is an optical storage device. In order to store the information, on the surface of CD, the surface is burned accordingly. That’s why writing a CD is also called burning a CD. Once written, the content of CD can’t be changed. Stored bits 0 1 1 0 Burned places Read Head throws a beam of light on the 1 surface and senses the reflected light. If 0 the beam reflects it indicates that 1 is 0 stored otherwise 0 is stored. Range of 1 Disk surface data storage is 650/700 MB.
  • 24. Digital Versatile Disk DVD ("Digital Versatile Disc" or "Digital Video Disc"): • A popular optical disc storage media format that can be used for data storage. • Including movies with high video and sound quality. • DVDs resemble CDs. • A DVD reader or writer can usually read CDs, but DVDs are encoded in a different format of much greater density, allowing a data storage capacity 8 times greater. • Range of storage capacity is from 2.8 Gigabytes to 4.7 Gigabytes.
  • 25. Memory Measurement Device Common available storage capacity Floppy Disk 1.44 MB Hard Disk 10 GB, 20 GB, 40 GB, 80 GB CD 650/700 MB DVD 2.8 – 4.7 GB
  • 27. Data Representation Data: raw facts, inserted into the computer to be processed. eg typing the alphabets through keyboard – G, O, D Information: processed data or output given by computer. eg the word GOD displayed on monitor. Types of Representation of Data • Internal Representation: values used by computer to store and process data. • External Representation: Computer translates data into the form of human understandable language of numbers, characters, figures and sound etc.
  • 28. Data Representation Bit: A bit refers to one binary digit. Either 0 or 1. Byte: Set of 8 bits is called byte. i.e. 1Byte = 8 Bits Word: It is a collection of 2 bytes or 4 bytes depending on the word size of computer, whether it is 16 bit computer or 32 bit computer 1024 bytes = 1Kilo Bytes 1024 KB = 1 Mega Bytes 1024 MB = 1 Giga Bytes