This document discusses different types of storage devices and how they function, including their relative speeds, capacities, and uses. It begins by explaining the hierarchy of storage devices from fastest to slowest: registers, cache, RAM, hard disks, optical disks, magnetic tapes, and solid state storage. The document then covers specific storage technologies like hard disk drives, optical disks (CDs, DVDs, Blu-ray), magnetic tapes, solid state drives, smart cards, and flash memory. It compares their performance and how operating systems manage storage using techniques like formatting, file systems, defragmentation, and compression.
This document discusses data storage and memory. It explains that instructions and data are stored in main memory which is made up of bytes that each hold 8 bits. It defines different units of measurement for memory size like kilobytes, megabytes, and gigabytes. The document outlines different types of memory like RAM, ROM, SRAM, and DRAM. It also describes various storage devices like floppy disks, hard drives, magnetic tapes, CDs, DVDs, and backup devices like tape streamers, zip drives, and jaz drives.
The document compares and contrasts different forms of removable storage devices, including floppy disks, USB memory sticks, portable hard drives, CDs, DVDs, and hard disks. It outlines the storage capacity, portability, and typical price ranges for each option. Floppy disks are obsolete but once held 1.44MB, while USB sticks can hold 1GB-36GB and are very portable. Portable hard drives hold more but sacrifice some portability, and cost £60-£80 on average.
Computer storage consists of primary and secondary memory. Primary memory, like registers and RAM, is directly accessible by the CPU while secondary memory, like hard disks, requires input/output channels. There are different types of secondary storage such as magnetic disks, optical disks, flash memory, and tape drives. Magnetic disks store data via polarized iron particles on disks or platters. Optical disks use lasers to burn data in spiral patterns onto disks. Flash memory cards have no moving parts. Tertiary memory provides robotic mounting and dismounting of removable media.
1. The document discusses different types of computer memory and storage devices. It describes RAM, ROM, SRAM, and DRAM memory types and how RAM is used for temporary data storage.
2. Storage devices discussed include floppy disks, hard disks, magnetic tape, CDs, DVDs, and other optical discs. Floppy disks contain flexible plastic disks and were used to transfer small amounts of data between computers.
3. Hard disks differ in that they contain rigid metal platters that spin faster than floppy disks and are sealed inside the computer. Magnetic tape is cheaper for storing files and documents and transferring information between computers.
The document discusses various types of auxiliary storage devices. It begins by defining auxiliary storage as secondary storage, also known as external memory. It then lists and provides brief descriptions of common auxiliary storage devices, including magnetic tapes, hard disks, floppy disks, zip disks, jaz disks, super disks, optical disks, DVDs, and USB flash drives. The document also distinguishes between sequential and random access media.
This chapter describes different types of storage devices used in computers. It discusses magnetic storage devices like hard disks and floppy disks, which use magnetism to store data. Optical storage devices like CDs and DVDs are also covered, which use lasers to read and write data. Finally, solid-state storage options like flash memory, smart cards, and solid-state drives are introduced. The document provides details on how each storage type works and its common uses. It also discusses topics like formatting disks, finding data locations, and measuring/improving drive performance.
This document discusses different types of backing storage used to permanently store programs and data, as main memory is erased when a computer is turned off. It describes hard disks, CDs, DVDs, solid state drives, USB flash drives and their typical storage capacities. It also identifies whether each type of backing storage media provides sequential or random access to stored data.
RAM is temporary storage that is volatile and clears when power is turned off, while ROM is permanent internal storage used to boot up a computer. Mass storage devices like hard disks and optical disks provide larger but slower storage than internal memory. Hard disks use magnetic disks to allow random access storage, while optical disks like CDs, DVDs, and Blu-ray use lasers to read serially accessed data at different storage capacities. Flash memory, memory cards, magnetic tapes, and floppy disks provide portable but slower storage options than internal memory. Backing up data involves copying it to a separate storage device for protection, while archiving removes old data to free up space.
This document discusses data storage and memory. It explains that instructions and data are stored in main memory which is made up of bytes that each hold 8 bits. It defines different units of measurement for memory size like kilobytes, megabytes, and gigabytes. The document outlines different types of memory like RAM, ROM, SRAM, and DRAM. It also describes various storage devices like floppy disks, hard drives, magnetic tapes, CDs, DVDs, and backup devices like tape streamers, zip drives, and jaz drives.
The document compares and contrasts different forms of removable storage devices, including floppy disks, USB memory sticks, portable hard drives, CDs, DVDs, and hard disks. It outlines the storage capacity, portability, and typical price ranges for each option. Floppy disks are obsolete but once held 1.44MB, while USB sticks can hold 1GB-36GB and are very portable. Portable hard drives hold more but sacrifice some portability, and cost £60-£80 on average.
Computer storage consists of primary and secondary memory. Primary memory, like registers and RAM, is directly accessible by the CPU while secondary memory, like hard disks, requires input/output channels. There are different types of secondary storage such as magnetic disks, optical disks, flash memory, and tape drives. Magnetic disks store data via polarized iron particles on disks or platters. Optical disks use lasers to burn data in spiral patterns onto disks. Flash memory cards have no moving parts. Tertiary memory provides robotic mounting and dismounting of removable media.
1. The document discusses different types of computer memory and storage devices. It describes RAM, ROM, SRAM, and DRAM memory types and how RAM is used for temporary data storage.
2. Storage devices discussed include floppy disks, hard disks, magnetic tape, CDs, DVDs, and other optical discs. Floppy disks contain flexible plastic disks and were used to transfer small amounts of data between computers.
3. Hard disks differ in that they contain rigid metal platters that spin faster than floppy disks and are sealed inside the computer. Magnetic tape is cheaper for storing files and documents and transferring information between computers.
The document discusses various types of auxiliary storage devices. It begins by defining auxiliary storage as secondary storage, also known as external memory. It then lists and provides brief descriptions of common auxiliary storage devices, including magnetic tapes, hard disks, floppy disks, zip disks, jaz disks, super disks, optical disks, DVDs, and USB flash drives. The document also distinguishes between sequential and random access media.
This chapter describes different types of storage devices used in computers. It discusses magnetic storage devices like hard disks and floppy disks, which use magnetism to store data. Optical storage devices like CDs and DVDs are also covered, which use lasers to read and write data. Finally, solid-state storage options like flash memory, smart cards, and solid-state drives are introduced. The document provides details on how each storage type works and its common uses. It also discusses topics like formatting disks, finding data locations, and measuring/improving drive performance.
This document discusses different types of backing storage used to permanently store programs and data, as main memory is erased when a computer is turned off. It describes hard disks, CDs, DVDs, solid state drives, USB flash drives and their typical storage capacities. It also identifies whether each type of backing storage media provides sequential or random access to stored data.
RAM is temporary storage that is volatile and clears when power is turned off, while ROM is permanent internal storage used to boot up a computer. Mass storage devices like hard disks and optical disks provide larger but slower storage than internal memory. Hard disks use magnetic disks to allow random access storage, while optical disks like CDs, DVDs, and Blu-ray use lasers to read serially accessed data at different storage capacities. Flash memory, memory cards, magnetic tapes, and floppy disks provide portable but slower storage options than internal memory. Backing up data involves copying it to a separate storage device for protection, while archiving removes old data to free up space.
This document discusses four main types of external memory: magnetic disks, optical disks, magnetic tape, and disk drives. Magnetic disks store data on circular platters coated with magnetic material and use read/write heads to access data. Optical disks like CDs, DVDs, and Blu-rays use lasers to read and write digital information to coated discs. Magnetic tape stores data on magnetic tape housed in cartridges and uses similar reading and writing techniques as disks. Disk drives, like hard disk drives, store large amounts of data on spinning magnetic platters that are read and written to by heads positioned very close to the disk surface.
The document discusses various methods for backing up data, including offline storage using removable drives, dedicated backup servers that can be located on-site or rented online, RAID storage using multiple disks for performance and fault tolerance, and tape backup. It also covers different backup strategies such as full, differential, and incremental backups and the 3-2-1 approach of having three copies of files across two physical devices and one offline copy. Regular backups that are stored in different locations are recommended.
Storage devices come in various types to suit different needs. Internal memory like ROM, RAM, and hard disks are built into computers, while external devices like floppy disks, zip disks, magnetic tapes, CDs/DVDs, and flash drives can transfer and store data. Larger capacity devices like hard disks, DVDs, and flash drives let users store more data than older options like floppy disks, but may be more expensive or fragile. The appropriate storage device depends on needs like data size, portability, and hardware compatibility.
This document discusses various secondary storage devices, including floppy disks, hard disks, CDs, DVDs, USB drives, and Blu-ray discs. It provides details on the history and evolution of floppy disks, describing their decreasing sizes over time from 8 inches to 3.5 inches. Hard disks are described as using rapidly rotating discs coated with magnetic material to store and retrieve data. CDs, DVDs, and Blu-ray discs are all described as optical storage using lasers, with each subsequent technology providing higher storage capacity and data transfer speeds.
Presentation of the big external memoryLuis Fernando
Hard drives are storage devices inside computers that store the operating system, programs, and files. They use spinning disks to store large amounts of data, from 200GB to 1TB, and retain data until deleted. External hard drives can be plugged into computers via USB to provide additional storage and are used for backup or transferring large amounts of data between devices, though they are bulky. Memory sticks and memory cards are portable storage devices that plug into USB ports or card readers and range in size from 512MB to 32GB, allowing users to easily store and transfer photos, music, and other files.
Storage devices can be categorized by their storage characteristics, capacity, and interface. Common storage devices include magnetic disks like hard disks, optical disks like CDs and DVDs, tape storage, and flash memory. Larger storage systems for organizations use storage area networks that connect servers to high-capacity storage devices over fiber channels, providing redundancy, backup capabilities, and high performance.
This document discusses the different types of computer storage devices. It describes primary storage (RAM), secondary storage (hard disks), and removable storage media. RAM is volatile memory that the CPU can directly access for active data and instructions. ROM is read-only and stores permanent functions. Hard disks are magnetic devices that serve as non-volatile secondary storage and can store large amounts of data. Removable media includes USB drives, memory cards, optical discs like CDs and DVDs, magnetic tapes, and external hard disks, which allow portable transfer and storage of data.
The document discusses various computer storage devices and their characteristics. It describes primary storage RAM and secondary storage devices like hard disk drives. It explains what RAM and ROM are, their differences, and provides examples of different types of storage media like CD-ROMs, DVDs, hard disks, floppy disks, flash memory, and how many bytes and bits are used to store data.
1. Computers use different types of storage including backing storage to store data when not in use, and main memory like RAM and ROM to access data currently being used.
2. RAM temporarily stores programs and data being used and is wiped when powered off, while ROM permanently stores the startup program and is not wiped when powered off.
3. Common backing storage devices include hard disks for large permanent storage, USB drives for portable storage, and optical discs like CDs and DVDs to store large amounts of read-only or writeable data.
Optical storage devices like CDs, DVDs, and Blu-rays provide permanent storage of data but cannot be reused once written, making them suitable for archiving. They allow random access of specific data and are widely used, though write speeds can be slow. Solid state storage like memory sticks and flash cards allow portable, robust storage of large amounts of data but are more expensive and risk being lost or broken than optical discs.
Storage devices can be optical, magnetic, or solid state. Optical devices like Blu-ray discs, CDs, and DVDs use lasers to read and write data while magnetic devices such as hard disks, magnetic tape, and floppy disks use magnetism. Solid state devices like external hard drives, SD cards, and USB flash drives store data electronically without moving parts or power source. Common storage devices vary in size, portability, storage capacity, and whether the data can be erased or not.
This document discusses and compares various types of optical storage media and solid state storage devices. It covers CDs, DVDs, Blu-ray discs, solid state drives, memory sticks, and flash memory cards. For each type it provides key details like storage capacity, advantages like portability, and disadvantages such as being read-only or breakable.
This presentation helps to understand easily storage devices with interactive look with a easy and efficient way. It may reduce the hurdles which are usually comes while we are trying to listen or understand the overall structure of Storage Devices.
Hope it may help you in your Educational and professional life.
Thanks.
The document discusses various storage devices and backup media. It describes disk drives that read from and write to magnetic disks, including hard disk drives, floppy disk drives, and different types of floppy disks. It also mentions other removable media such as Zip drives, Jaz drives, USB flash drives, and magnetic tape. The document provides details on what is inside a hard drive, including platters, read/write heads, tracks and sectors.
Primary storage refers to memory like RAM and ROM, while secondary storage refers to peripheral devices like disks and tapes used for additional storage. Secondary storage is required for three reasons: data in memory is volatile and can be lost, memory capacity is limited, and memory is more expensive than secondary storage. Common secondary storage devices include floppy disks, hard disks, and optical disks like CDs and DVDs, as well as tape backups. Floppy disks can store 1-100 MB of data but are small and portable. Hard disks can store hundreds of GB but are fixed internally; removable hard disks also exist. Optical disks like CDs and DVDs can store large amounts of data quickly but DVDs store more data and
Storage devices
This lesson includes the following sections:
Categorizing Storage Devices
Magnetic Storage Devices
Optical Storage Devices
Storage devices hold data, even when the computer is turned off.
The physical material that actually holds data is called a storage medium. The surface of a floppy disk is a storage medium.
The hardware that writes data to or reads data from a storage medium is called a storage device. A floppy disk drive is a storage device.
The two primary storage technologies are magnetic and optical.
Diskettes (floppy disks)
Hard disks
High-capacity floppy disks
Disk cartridges
Magnetic tape
Compact Disk Read-Only Memory (CD-ROM) A magnetic disk's medium contains iron particles, which can be polarized—given a magnetic charge—in one of two directions.
Each particle's direction represents a 1 (on) or 0 (off), representing each bit of data that the CPU can recognize.
A disk drive uses read/write heads containing electromagnets to create magnetic charges on the medium.
Digital Video Disk Read-Only Memory
(DVD-ROM)
CD-Recordable (CD-R)
CD-Rewritable (CD-RW)
PhotoCD
The document discusses disk formatting, which prepares a data storage device. Formatting involves low-level formatting to subdivide tracks into blocks, partitioning to allow operating system access, and high-level formatting to set up a file system. Advanced format uses larger sectors for storage efficiency and error correction at higher densities. Formatting operations create the structure of sectors with gaps, sync marks, address marks, data, and error correction codes. Methods to check partition alignment on Windows include using the wmic command to view starting offsets.
What is Operating System, Utility program,virus and anti_virusmudasserakram
in this slides, we learn what is operating system and utility program. how to make a window in computer trough USB and DVD/CD. We also learn all type of virus.
This document discusses four main types of external memory: magnetic disks, optical disks, magnetic tape, and disk drives. Magnetic disks store data on circular platters coated with magnetic material and use read/write heads to access data. Optical disks like CDs, DVDs, and Blu-rays use lasers to read and write digital information to coated discs. Magnetic tape stores data on magnetic tape housed in cartridges and uses similar reading and writing techniques as disks. Disk drives, like hard disk drives, store large amounts of data on spinning magnetic platters that are read and written to by heads positioned very close to the disk surface.
The document discusses various methods for backing up data, including offline storage using removable drives, dedicated backup servers that can be located on-site or rented online, RAID storage using multiple disks for performance and fault tolerance, and tape backup. It also covers different backup strategies such as full, differential, and incremental backups and the 3-2-1 approach of having three copies of files across two physical devices and one offline copy. Regular backups that are stored in different locations are recommended.
Storage devices come in various types to suit different needs. Internal memory like ROM, RAM, and hard disks are built into computers, while external devices like floppy disks, zip disks, magnetic tapes, CDs/DVDs, and flash drives can transfer and store data. Larger capacity devices like hard disks, DVDs, and flash drives let users store more data than older options like floppy disks, but may be more expensive or fragile. The appropriate storage device depends on needs like data size, portability, and hardware compatibility.
This document discusses various secondary storage devices, including floppy disks, hard disks, CDs, DVDs, USB drives, and Blu-ray discs. It provides details on the history and evolution of floppy disks, describing their decreasing sizes over time from 8 inches to 3.5 inches. Hard disks are described as using rapidly rotating discs coated with magnetic material to store and retrieve data. CDs, DVDs, and Blu-ray discs are all described as optical storage using lasers, with each subsequent technology providing higher storage capacity and data transfer speeds.
Presentation of the big external memoryLuis Fernando
Hard drives are storage devices inside computers that store the operating system, programs, and files. They use spinning disks to store large amounts of data, from 200GB to 1TB, and retain data until deleted. External hard drives can be plugged into computers via USB to provide additional storage and are used for backup or transferring large amounts of data between devices, though they are bulky. Memory sticks and memory cards are portable storage devices that plug into USB ports or card readers and range in size from 512MB to 32GB, allowing users to easily store and transfer photos, music, and other files.
Storage devices can be categorized by their storage characteristics, capacity, and interface. Common storage devices include magnetic disks like hard disks, optical disks like CDs and DVDs, tape storage, and flash memory. Larger storage systems for organizations use storage area networks that connect servers to high-capacity storage devices over fiber channels, providing redundancy, backup capabilities, and high performance.
This document discusses the different types of computer storage devices. It describes primary storage (RAM), secondary storage (hard disks), and removable storage media. RAM is volatile memory that the CPU can directly access for active data and instructions. ROM is read-only and stores permanent functions. Hard disks are magnetic devices that serve as non-volatile secondary storage and can store large amounts of data. Removable media includes USB drives, memory cards, optical discs like CDs and DVDs, magnetic tapes, and external hard disks, which allow portable transfer and storage of data.
The document discusses various computer storage devices and their characteristics. It describes primary storage RAM and secondary storage devices like hard disk drives. It explains what RAM and ROM are, their differences, and provides examples of different types of storage media like CD-ROMs, DVDs, hard disks, floppy disks, flash memory, and how many bytes and bits are used to store data.
1. Computers use different types of storage including backing storage to store data when not in use, and main memory like RAM and ROM to access data currently being used.
2. RAM temporarily stores programs and data being used and is wiped when powered off, while ROM permanently stores the startup program and is not wiped when powered off.
3. Common backing storage devices include hard disks for large permanent storage, USB drives for portable storage, and optical discs like CDs and DVDs to store large amounts of read-only or writeable data.
Optical storage devices like CDs, DVDs, and Blu-rays provide permanent storage of data but cannot be reused once written, making them suitable for archiving. They allow random access of specific data and are widely used, though write speeds can be slow. Solid state storage like memory sticks and flash cards allow portable, robust storage of large amounts of data but are more expensive and risk being lost or broken than optical discs.
Storage devices can be optical, magnetic, or solid state. Optical devices like Blu-ray discs, CDs, and DVDs use lasers to read and write data while magnetic devices such as hard disks, magnetic tape, and floppy disks use magnetism. Solid state devices like external hard drives, SD cards, and USB flash drives store data electronically without moving parts or power source. Common storage devices vary in size, portability, storage capacity, and whether the data can be erased or not.
This document discusses and compares various types of optical storage media and solid state storage devices. It covers CDs, DVDs, Blu-ray discs, solid state drives, memory sticks, and flash memory cards. For each type it provides key details like storage capacity, advantages like portability, and disadvantages such as being read-only or breakable.
This presentation helps to understand easily storage devices with interactive look with a easy and efficient way. It may reduce the hurdles which are usually comes while we are trying to listen or understand the overall structure of Storage Devices.
Hope it may help you in your Educational and professional life.
Thanks.
The document discusses various storage devices and backup media. It describes disk drives that read from and write to magnetic disks, including hard disk drives, floppy disk drives, and different types of floppy disks. It also mentions other removable media such as Zip drives, Jaz drives, USB flash drives, and magnetic tape. The document provides details on what is inside a hard drive, including platters, read/write heads, tracks and sectors.
Primary storage refers to memory like RAM and ROM, while secondary storage refers to peripheral devices like disks and tapes used for additional storage. Secondary storage is required for three reasons: data in memory is volatile and can be lost, memory capacity is limited, and memory is more expensive than secondary storage. Common secondary storage devices include floppy disks, hard disks, and optical disks like CDs and DVDs, as well as tape backups. Floppy disks can store 1-100 MB of data but are small and portable. Hard disks can store hundreds of GB but are fixed internally; removable hard disks also exist. Optical disks like CDs and DVDs can store large amounts of data quickly but DVDs store more data and
Storage devices
This lesson includes the following sections:
Categorizing Storage Devices
Magnetic Storage Devices
Optical Storage Devices
Storage devices hold data, even when the computer is turned off.
The physical material that actually holds data is called a storage medium. The surface of a floppy disk is a storage medium.
The hardware that writes data to or reads data from a storage medium is called a storage device. A floppy disk drive is a storage device.
The two primary storage technologies are magnetic and optical.
Diskettes (floppy disks)
Hard disks
High-capacity floppy disks
Disk cartridges
Magnetic tape
Compact Disk Read-Only Memory (CD-ROM) A magnetic disk's medium contains iron particles, which can be polarized—given a magnetic charge—in one of two directions.
Each particle's direction represents a 1 (on) or 0 (off), representing each bit of data that the CPU can recognize.
A disk drive uses read/write heads containing electromagnets to create magnetic charges on the medium.
Digital Video Disk Read-Only Memory
(DVD-ROM)
CD-Recordable (CD-R)
CD-Rewritable (CD-RW)
PhotoCD
The document discusses disk formatting, which prepares a data storage device. Formatting involves low-level formatting to subdivide tracks into blocks, partitioning to allow operating system access, and high-level formatting to set up a file system. Advanced format uses larger sectors for storage efficiency and error correction at higher densities. Formatting operations create the structure of sectors with gaps, sync marks, address marks, data, and error correction codes. Methods to check partition alignment on Windows include using the wmic command to view starting offsets.
What is Operating System, Utility program,virus and anti_virusmudasserakram
in this slides, we learn what is operating system and utility program. how to make a window in computer trough USB and DVD/CD. We also learn all type of virus.
This document discusses operations security principles and controls. It covers general security concepts like accountability, separation of duties, and least privilege. It then details various technical, physical, and administrative controls for securing hardware, software, data, communications, facilities, personnel, and operations. The goals are to prevent security issues, detect any violations, and enable recovery of systems and data if problems occur. Key areas covered include access controls, backup and disaster recovery, change management, and configuration management.
This document discusses data security, file security, and computer viruses. It explains that data security and control involves protecting data from unauthorized access and destruction. It describes various methods for controlling data input, including manual control, data preparation, and validation checks. The document also discusses the need for file security to protect files from unauthorized users and the importance of user passwords and usernames. Finally, it outlines common sources of computer viruses and methods for detecting and removing viruses, such as using antivirus software and performing system restores.
The document provides an overview of operating system concepts, including:
- The basic components of a computer system including the processor, main memory, I/O modules, and system bus.
- How the processor fetches and executes instructions from main memory in a cycle. Interrupts allow I/O devices to signal the processor to improve efficiency.
- The memory hierarchy addresses constraints of memory speed and cost through caches and secondary storage.
- I/O techniques like programmed I/O, interrupt-driven I/O, and direct memory access (DMA) control data transfer between memory and I/O devices.
- Symmetric multiprocessor (SMP) systems use multiple identical processors that
Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )Neeraj Bhandari
This document discusses different types of secondary storage devices, including magnetic tape, magnetic disks, optical disks, and pen drives. It covers topics like storage organization, capacity, access times, drives, controllers, advantages and limitations for each type of device. The purpose is to classify commonly used secondary storage and describe their key characteristics.
This document discusses various techniques for hiding data in the Microsoft Windows operating system. It covers logical techniques like assigning hidden and system attributes, changing file extensions and icons. It also discusses more advanced techniques like using alternate data streams that allow hiding data in files, and using class identifiers (CLSIDs) meant for special folders for regular folders to disguise hidden data. The document provides an overview of the NTFS file system used by Windows and how its alternate data stream feature can be exploited for data hiding. It also recommends some tools that can be used to detect hidden data streams.
Primary memory, also known as main memory or internal memory, is directly accessible to the CPU and holds temporary data during program execution. It includes RAM, ROM, PROM, and EPROM. Secondary memory, also called external memory or auxiliary memory, provides larger storage and retains data when power is removed. Common examples are hard disks, CD-ROMs, magnetic tapes, and flash memory. Secondary memory is organized into files and directories for abstraction and includes additional metadata.
Magnetic storage devices like hard drives and floppy disks store data using magnetism on metal platters. Optical storage devices like CDs and DVDs use lasers to read data encoded in pits and lands on plastic discs. Solid state devices store data using physical switches rather than magnetism or lasers. Common storage devices include hard drives for primary storage, floppy disks and flash drives for removable storage, and tapes for backups. Data is organized on disks in tracks and sectors to allow efficient reading and writing.
The document describes different types of storage devices used in computers. It discusses magnetic storage devices like hard drives and floppy disks which use magnets to write binary data to iron oxide coated disks. Optical storage devices like CDs and DVDs are also covered, using lasers to write to disks. Finally, solid state devices are mentioned, which store data physically without moving parts, like flash memory in USB drives and cameras.
This document discusses different types of disk storage devices. It begins by defining disk storage as using magnetic, optical, or mechanical methods to record data on rotating disks. The first commercial disk storage device was the IBM 350 in 1956. Disk storage offers advantages like speed of access, control over data, lower cost per unit of data, and reliability compared to other storage methods. The document then describes different types of disk storage devices like hard disk drives, optical storage devices, magnetic tape drives, floppy disks, and portable hard disks. It explains the mechanisms, structures, and characteristics of each type.
The document discusses various physical storage media used in computers including cache, main memory, flash memory, magnetic disks, optical disks, and magnetic tapes. It classifies storage based on characteristics like speed of access, cost, and reliability. RAID systems are described which provide storage virtualization through techniques like mirroring and striping across disks to improve performance and reliability. Different RAID levels are outlined including RAID 0, 1, 2, 3, 4, 5, and 6.
Primary storage refers to memory in a computer system like RAM and ROM. Secondary storage is provided by peripheral devices like hard disks, floppy disks, optical disks, and tape drives to store large amounts of data outside of memory. Secondary storage is required for three reasons: 1) memory contents are volatile and lost when power is disconnected, 2) memory capacity is limited, and 3) memory is more expensive than secondary storage. Common secondary storage devices include floppy disks, hard disks, CDs, DVDs, and tape drives used for backups.
Computer memory can be classified into different types. The main types include semiconductor memory, cache memory, magnetic disks, optical disks, and tape drives. Semiconductor memory includes volatile RAM and non-volatile ROM. Cache memory is high-speed memory placed between the CPU and main memory for faster access. Magnetic disks include hard disks used for permanent storage and floppy disks for removable storage. Optical disks include CDs, DVDs, and Blu-ray disks. Tape drives are used for backup storage. RAID (Redundant Array of Independent Disks) utilizes multiple disks for performance, capacity, and reliability.
This document discusses database storage systems and file structures. It begins by defining primary, secondary, and tertiary storage devices. It then discusses various memory types like cache, RAM, USB, SSD, magnetic disks, magnetic tapes, and optical disks. The document also covers topics like memory hierarchy, RAID types, file organization methods, file operations, and categories of file operations.
Memory is divided into primary and secondary storage. Primary memory (RAM and ROM) is temporary and allows for quick access, while secondary memory provides permanent storage of large amounts of data even when the computer is off. Secondary storage devices include magnetic hard disks and floppy disks, as well as optical disks like CD-ROMs, DVDs, and Blu-ray discs that store data using lasers.
This document summarizes different types of computer data storage media. It describes the characteristics of cache, main memory, flash memory, magnetic disk storage, optical storage, and tape storage. Magnetic disk storage provides the bulk of secondary storage and is described in more detail. Disks are made up of platters divided into tracks then sectors. A disk has moving read-write heads that can access any location by seeking to the correct track. Performance is measured by access time, transfer rate, and reliability.
This document discusses computer memory and storage. It defines primary and secondary memory, and describes their key differences. Primary memory, also called main memory, is volatile and used for processing. It has high access speeds but limited capacity. Secondary memory is non-volatile and used for long-term storage of large volumes of data. Common types of primary memory include RAM, ROM, and cache. Common forms of secondary memory include hard disks, optical disks, magnetic tapes, USB drives, and cloud storage. The document evaluates various storage media and provides details on their characteristics like capacity, access times, and usage.
The document discusses various computer memory and storage devices. It covers RAM, ROM, magnetic storage like hard disks and floppy disks, and optical storage like CDs, DVDs, and Blu-ray discs. It defines key terms related to these storage technologies like volatile vs non-volatile memory, and size units like megabytes, gigabytes, and terabytes. Characteristics of different storage types are explored such as speed, capacity, cost and portability.
The document discusses different types of computer memory and storage devices. It describes RAM, ROM, PROM, and EPROM as memory devices, and how they differ in terms of volatility and accessibility. For storage, it outlines magnetic devices like hard disks, floppy disks, and tapes, as well as optical disks like CDs, DVDs, and Blu-ray. It provides details on the storage capacities and characteristics of each type of memory and storage device.
The document discusses different types of computer data storage, including primary storage such as RAM and ROM, and secondary storage devices like floppy disks, hard disks, CDs, and DVDs. It describes the characteristics of each storage type including access time, storage capacity, and cost, and explains how data is represented and stored internally in a computer using bits and bytes.
The document discusses different types of data storage used in computer systems, including primary storage such as RAM and ROM, and secondary storage devices like hard disks, floppy disks, CDs, and DVDs. It describes the characteristics of these storage units like access time, storage capacity, and cost, and explains how data is represented and stored in each type of storage device.
Welcome to the Live Memory Forensics class!
This is an introduction to live memory forensics
It is designed for the investigator who has digital forensic experience, and who has intermediate ability with the Microsoft Windows operating system
This document summarizes information about secondary storage devices and mass storage technologies. It discusses the physical structure and performance characteristics of magnetic disks, as well as technologies like solid state drives and tape drives. It also covers disk addressing, interfaces like SCSI and Fibre Channel, storage arrays, disk scheduling algorithms, RAID technologies, and operating system services for mass storage like swap space and journaling file systems.
The document contains a 10 question quiz about operating systems and networking. It asks about the definitions of operating systems and networking, core components of an operating system, operating system tasks, network topologies, whether an operating system is an application, data structure terminology in networking, the physical path data travels, communication rules, and examples of multi-user multi-tasking operating systems. The quiz tests fundamental concepts in operating systems and networking.
The lecture covers four main topics: 1) artificial intelligence including machine learning, natural language processing, and robotics, 2) ubiquitous computing using personal area networks, wireless sensor networks, and RFID tags, 3) next-generation networking through IP convergence and cloud/grid computing, and 4) conclusions. The goal of the lecture is to provide an overview of these emerging technologies.
This document outlines the key points from an ethics lecture, including:
1. It defines ethics as a branch of philosophy concerning right conduct and a good life.
2. It discusses the Islamic code of ethics regarding rituals, beliefs, social conduct, and moral character.
3. It covers the basics of network etiquette, including 8 broad rules like respecting others and intellectual property.
4. It provides a brief overview of the ACM code of ethics and its 7 principles.
5. It discusses how to acquire good ethics through learning, the company of righteous people, and intention.
This document outlines key topics in information security including basic terminology like vulnerabilities, threats, and attacks. It discusses different types of malware like viruses, trojans, and spyware. It also describes spoofing attacks including email, URL, DNS, IP, and MAC spoofing. Network-based attacks like worms and denial of service attacks are mentioned. Social engineering techniques that target human weaknesses are discussed. The document concludes with recommendations for protecting systems like using firewalls, updating software, using antivirus, and backing up data.
This lecture introduced databases and database management systems. It discussed how databases are used to organize address books, household budgets, book libraries, inventory, HR/payroll, and dynamic websites. The lecture covered flat-file and relational databases, and how relational databases improve performance over flat files. It also described database management systems, their functions like data housekeeping and querying, and the SQL language. Popular database examples like MySQL were listed. Finally, the lecture defined data mining as the process of extracting useful information from data, and discussed its uses in recommender systems and pattern mining.
The document summarizes key points from a lecture on software programming. It discusses the five steps of programming: specification, design, coding, testing, and maintenance. It also covers different programming languages from machine language to natural languages. Object-oriented programming and visual programming are introduced as well. Common programming languages mentioned include C++, Python, and .NET.
The lecture discusses different types of application software including office productivity software like word processors and spreadsheets, entertainment software for multimedia and graphics, and communications software for the internet. It also covers topics like the difference between gratis, freeware, and free software as well as how applications can be distributed.
The document discusses how email works and different types of computer networks. It explains that when a user sends an email, it is transmitted using SMTP from the user's email client to an email server. When a user receives email, it is retrieved from the server using either POP or IMAP. Networks can be classified based on their geographical scope, paradigm, hierarchy, or type. Examples of different network technologies discussed include MPLS, ATM, dial-up, DSL, cable, and WiMax.
This document discusses internetworking and networking concepts such as network topologies, IP addressing, DNS lookups, ARP requests, layered communication in the TCP/IP model, and an example of how a client request is routed from one network to another. It includes examples of point to point, star, tree, and other common network topologies. It also explains IP addresses, subnet masks, network vs host parts of an IP, and how addresses are assigned. DNS and ARP requests are demonstrated along with the layered TCP/IP communication model. Finally, it provides a simplified example of routing a request between networks.
This chapter of the textbook discusses several topics related to computers including intellectual property rights, ethics, health impacts, access issues, and environmental concerns. It covers various types of intellectual property like copyrights, trademarks, and patents. It also discusses ethics in areas such as use of copyrighted material, resources, and information. The chapter addresses physical and emotional health risks of computer use as well as factors that influence digital access. It concludes by suggesting ways to practice green computing and properly dispose of e-waste.
This chapter discusses computer security and privacy. It covers risks related to hardware loss, damage, and system failures. It also discusses software piracy, digital counterfeiting, and ways to prevent them. The chapter then addresses privacy concerns regarding databases, electronic profiling, spam, surveillance, and legislation around these issues. It provides recommendations for safeguarding hardware, data backups, and protecting personal information online and offline.
This chapter discusses databases and database management systems. It defines what a database is, including tables, fields, records and keys. It describes important database concepts like data integrity, security and privacy. It also covers different database classifications, models and how databases are commonly used on the web. The relational model is highlighted as the most widely used today for organizing data in tables related by common fields.
This chapter discusses program development and programming languages. It covers the program development life cycle which includes problem analysis, program design, coding, debugging, testing and implementation. It describes different approaches to program design such as procedural, object-oriented and aspect-oriented programming. It also discusses tools that can help facilitate program development like flowcharts, pseudocode and UML diagrams. Finally, it provides an overview of common programming languages like FORTRAN, COBOL, C, C++, Java, Python and Ruby.
The document discusses information systems and system development. It defines information systems and explains why they are needed in organizations. It identifies the major types of information systems commonly used, including office systems, transaction processing systems, decision support systems, geographic information systems, and integrated enterprise systems. It also describes the individuals involved in system development and the steps of the system development life cycle.
This chapter discusses e-commerce and implementing e-commerce websites. It covers the advantages and disadvantages of e-commerce for businesses and customers. It also describes different e-commerce business models like B2C, B2B, and C2C. Additionally, it outlines the steps to implement a web-based e-commerce site, including selecting a business model, payment options, and designing an effective website. Security considerations are also discussed.
This chapter discusses multimedia and web design. It defines multimedia as the integration of various media types, such as text, images, video, animation and sound. Web-based multimedia refers to multimedia located on web pages. The chapter covers the basic elements of multimedia like text, images, animation, audio and video. It discusses the advantages and disadvantages of using multimedia. It also describes the process of designing multimedia web sites, including determining objectives and audience, using flowcharts and page layouts. The chapter outlines how to develop a site using HTML, CSS, scripting languages and other tools to create the content and interface. It discusses testing, publishing and maintaining the finished site.
This chapter discusses network and internet security. It covers unauthorized access and computer sabotage. Examples of unauthorized access include hacking, war driving, and piggybacking on unsecured wireless networks. Computer sabotage includes malware, denial of service attacks, and data/program alteration. The chapter also discusses online theft, fraud, and scams. It provides recommendations for protecting against these security issues, such as using firewalls, encryption, VPNs, and security software. It stresses the importance of being cautious about sharing personal information online.
The chapter discusses the evolution of the Internet from its origins as ARPANET connecting a few computers to today's massive global network. It describes the various groups that make up the Internet community such as users, internet service providers, and content providers. The chapter covers options for connecting to the Internet including types of connections like broadband, selecting an internet service provider, and setting up a computer to access the internet. It also discusses using search engines to find information online and common internet applications.
This document provides an overview of computer networks including definitions, applications, characteristics, and standards. It defines a network as a connected system that allows sharing of hardware, software, and data between computers. The chapter describes common network applications like the Internet, phones, GPS, and videoconferencing. It also covers network topologies, architectures, sizes, data transmission methods, and both wired and wireless networking media. Finally, it discusses important communications protocols and standards used in modern networks.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
7. History
Parkinson’s law: Data expands to fill the space
available for storage
Corollary: Work expands to fill the time available.
1956: IBM invented the first storage
system; had 50 disks of 2 foot diameter!
The capacity …. 5 MB
Currently, we have hard disks of > 1.5 TB
Do we need more storage capacity
14. Hard disk drive
spins at 5400, 7200, 10000, 15000 RPM;
takes 6 to 12 milliseconds to find data;
holds up to 1.5 TB data
Most commonly used storage media
15. Sequential access (not random)
Can store very large amounts of data
Commonly used for:
Backups
Infrequently used data
19. • CD-ROM (Capacity: 650 MB)
CD speed is based on the original CD
speed (150 kbps); 10 X will read
1,500 Kbps
• DVD-ROM (Capacity up to 18 GB)
Use both sides of the disk; can read
CD-ROMs
Read only optical drives:
20. • CD-R (Capacity: 650/700 MB)
Can record once; cannot be changed
Can keep adding until disk full
• CD-RW (Capacity up to 650/700 MB)
Can record and can rewrite too (upto 100 times)
Cannot be read in all CD players
Recordable optical drives:
21. • Photo-CD (developed by Kodak)
Photo storage;
Add until disk is full
(like CD-R)
Original pictures
cannot be changed
Recordable optical drives:
22. • DVD-R (Capacity: 4.7/ 8.5 GB)
Several formats; none standardized
Cannot be read in all players
• DVD-RAM
Allows reusing DVD media; Not
standardized; Easily writable
Cannot be read in all players
Recordable optical drives:
24. How they function:
No moving parts
(unlike magnetic/ optical storage)
A solid-state drive (SSD) is a data storage
device that uses solid-state memory to
store persistent data.
An SSD using SRAM or DRAM (instead of
flash memory) is often called a RAM-drive.
25. Flash memory:
Found in cameras and USB drives
Combination of RAM and ROM
Long term updateable storage
26. Smart card:
Credit cards with a chip
Chip stores data
May be used as electronic cash
Hotels use for electronic keys
27. Solid State Disks (SSD):
Large amount of SDRAM
Extremely fast
Volatile storage
Require battery backups
Most have hard disks copying data
30. Average access time
Depends on 1) RPM, 2) time to access track
Hard disk: 6 to 12 ms; CD drive: 80 to 800 ms
In contrast, RAM access time is in nanoseconds
Transfer rate
Hard disk: 15 – 160 Mbps;
CD drive: base rate= 150 Kbps; 24x; 48x
Floppy disks: 45 Kbps
32. Formatting
Disk formatting is the process of preparing a hard
disk or other storage medium for use, including
setting up an empty file system [Wikipedia].
2 levels of formatting:
Low-level: drawing tracks and sectors on disk
High-level: creating filesytem and bootsector
(sometimes called quick or logical format)
33. File Systems
A file system is a logical method of
configuring data on a disk’s surface.
Listing of where files are stored
Common file systems include:
1. File Allocation Table (FAT)
2. FAT32
3. NTFS
4. EXT2/EXT3 (Linux)
Kinds of storage devices:
Magnetic devices use a magnet
Optical devices use lasers
Solid-state devices have physical switches
Media is the material storing data
Storage devices manage the media
Motivations for studying storage devices:
1. Storage devices are essential components of computers.
2. We can improve our computer’s performance through disk optimization.
A ranking of computer memory devices, with devices having the fastest access time at the top of the hierarchy, and devices with slower access times but larger capacity and lower cost at lower levels.
The hierarchical arrangement of storage in current computer architectures is called the memory hierarchy. It is designed to take advantage of memory locality in computer programs. Each level of the hierarchy has the properties of higher bandwidth, smaller size, and lower latency than lower levels. Most modern CPUs are so fast that for most program workloads, the locality of reference of memory accesses and the efficiency of the caching and memory transfer between different levels of the hierarchy are the practical limitation on processing speed. As a result, the CPU spends much of its time idling, waiting for memory I/O to complete.
The levels of memory in a computer. From fastest to slowest speed, they are:
Processor registers – fastest possible access (usually 1 CPU cycle), only hundreds of bytes in size
Level 1 (L1) cache – often accessed in just a few cycles, usually tens of kilobytes
Level 2 (L2) cache – higher latency than L1 by 2 to 10 times, often 512 KB or more
Main memory – may take hundreds of cycles, but can be multiple gigabytes.
Secondary and Tertiary storage – several seconds latency, can be huge
Analogy:
The student has a study table at home, that can keep 1 to 2 books. He has a file cabinet at a hand span's length that can store 10 books. The bigger file cabinet is kept in the home library that can store up to 100 books. The city library (5 kms away), on the other hand, has many cabinets and can store thousands of books. The student is not very intelligent in the sense that he needs to be told everything that is to be done, i.e., he needs to be given data and instructed what to do with it.
Note the hierarchical structure: 1 book on study table; 10 books on study room's file cabinet; 100 books in home library; and 1000s of books in the city library. The study room file cabinet only stores the book that the students needs at this time, or will need very soon. Due to their small size, the study table and study room's file cabinet can store a limited number of data/ instructions only. The city library acts a repository (collection) of instructions to solve problems (called programs) and data.
The student can only work (process) data/ instructions that are on his study table. The student can extend his hand to the study room's file cabinet (cache) to fetch some book/ instructions in a very short time. He has hired a very efficient assistant called Northbridge that will bring him the data/ instructions he requires from the home library (RAM) to the study room file cabinet (cache memory) and then to his study table (CPU registers) in a short time. The student prefers that most of the instructions/data are present on the study room file cabinet (cache memory) since it requires minimal waiting. If the instructions/ data are not present on the study room final cabinet, the assistant Northbridge can fetch the data from the home library in a short time. The thing the student dislikes most is that the required instruction/ data is not available even in the home library (RAM); in such a case, another assistant Southbridge (who is quite lazy and slow) has to co-ordinate with the city librarian (disk controller) to get the books delivered; this often takes a long time and the student has to sit idle all this while to his dismay.
Let's now explain what the analogy meant: the student is the CPU; the study table (used to store the books temporally) is CPU registers; the file cabinet at a hand span's length is the cache memory; the file cabinet in the home library is the RAM; the file cabinet in the Library is the hard disk; the assistant to fetch documents from home library is the Northbridge chip; the assistant to fetch documents from the city library is the Southbridge chip. The CPU can only decode instructions and operate on data in the CPU registers (that is a kind of very quick memory private to the CPU). The programs/instructions stored on hard disk firstly have to be brought to RAM by Southbridge. When these instructions/data are referred to by the CPU, they are taken to the CPU registers and are stored in the cache en-route in case the data/instructions are referred to again---in such a case, the request would be fulfilled by the cache itself and the data would not have to brought from RAM.
It's obvious that if the student has to perform efficiently, most of the data should be in the study room file cabinet (cache memory).
Caching usually adopts two approaches to ensure that requested data/information is available:
1) Hold on the recently used instructions/ data since usually if you refer once to an instruction/ data, chances are that you would refer to it again soon.
2) Predict what instructions/ data, the CPU would require next. The better the prediction, the better the performance of the CPU.
Nonvolatile
Information isn’t lost when computer is turned off.
Many types – Depends on your needs
Most common form of storage
Hard drives, floppy drives, tape
All magnetic drives work the same
The hard disk drive has short and fascinating history. In 24 years it evolved from a monstrosity with fifty two-foot diameter disks holding five MBytes (5,000,000 bytes) of data to today's drives measuring 3 /12 inches wide and an inch high (and smaller) holding 400 GBytes (400,000,000,000 bytes/characters). Here, then, is the short history of this marvelous device. (http://www.duxcw.com/digest/guides/hd/hd2.htm)
n 1956 IBM invented the first computer disk storage system, the 305 RAMAC (Random Access Method of Accounting and Control). This system could store five MBytes. It had fifty, 24-inch diameter disks!
In 1980, Seagate Technology introduced the first hard disk drive for microcomputers, the ST506. It was a full height (twice as high as most current 5 1/4" drives) 5 1/4" drive, with a stepper motor, and held 5 Mbytes.
Data storage and retrieval
Media is covered with iron oxide
Read/write head is a magnet
Magnet writes charges on the media
Positive charge is a 1
Negative charge is a 0
Magnet reads charges
Drive converts charges into binary
Data organization
Disks must be formatted before use
Format draws tracks on the disk
Tracks is divided into sectors
Amount of data a drive can read
Tracks, cylinders
Sectors, clusters
Platter
Mylar plastic
Easily damaged
Diskettes
Also known as floppy disks
Read with a disk drive
Mylar disk
Spin at 300 RPM
Takes .2 second to find data
3 ½ floppy disk holds 1.44 MB
Zip disk: 100 MB or 250 MB = 170 floppies
Iomega™
Need a special drive
Superdisk: 120 MB
Laptops
Imation™
Hi FD Disks: 200 MB
Sony
Can read a 1.44 floppy
Thick and rigid; Large capacity; High speed; Magnetic
Use Metal Platters; Each platter has 2 sides
Sensitive (Hard disk crash) You can lose data!
Primary storage device in a computer
Spin between 5,400 to 15,000 RPM
Data found in 9.5 ms or less
Drive capacity usually greater than 40 GB
Backup files on a tape cartridge
Must be accessed sequentially from beginning to end. To illustrate, compare the modern audio CD to the antiquated 8-track. On a CD if you wish to hear song 1 over and over, you simply press repeat. In an 8-track, you often must play the entire tape before the song can be repeated.
Optical Disks: CD and DVD
Uses reflected light
Data is read by lasers
Size varies – 3.5” to 14”
4” X 4” is the most common
Rotation speed is important
24X speed accesses 3.6 MB per second
Data is stored physically
No magnets or laser
Very fast
No moving parts
Costly
“Flash” memory for laptops, cameras, MP3.
Lower read time --- they are much faster than hard drives.
For more details, study http://en.wikipedia.org/wiki/Solid_state_disk
No moving parts
Costly
“Flash” memory for laptops, cameras, MP3.
No moving parts
Costly
“Flash” memory for laptops, cameras, MP3.
No moving parts
Costly
“Flash” memory for laptops, cameras, MP3.
A ranking of computer memory devices, with devices having the fastest access time at the top of the hierarchy, and devices with slower access times but larger capacity and lower cost at lower levels.
The hierarchical arrangement of storage in current computer architectures is called the memory hierarchy. It is designed to take advantage of memory locality in computer programs. Each level of the hierarchy has the properties of higher bandwidth, smaller size, and lower latency than lower levels. Most modern CPUs are so fast that for most program workloads, the locality of reference of memory accesses and the efficiency of the caching and memory transfer between different levels of the hierarchy are the practical limitation on processing speed. As a result, the CPU spends much of its time idling, waiting for memory I/O to complete.
The levels of memory in a computer. From fastest to slowest speed, they are:
Processor registers – fastest possible access (usually 1 CPU cycle), only hundreds of bytes in size
Level 1 (L1) cache – often accessed in just a few cycles, usually tens of kilobytes
Level 2 (L2) cache – higher latency than L1 by 2 to 10 times, often 512 KB or more
Main memory – may take hundreds of cycles, but can be multiple gigabytes.
Secondary and Tertiary storage – several seconds latency, can be huge
Each track and sector is labeled
Some are reserved
Listing of where files are stored
File Allocation Table (FAT)
FAT32
NTFS
Data is organized in clusters
Size of data the OS handles
Disk optimization
Handled by operating system tool
Routine disk maintenance
Optimization should be run monthly
Clean up unnecessary files
Delete temp files
Uninstall unused programs
Delete obsolete data files
Files should be cleaned weekly
Scan a disk for errors
Bad spots on the media
Find and fix the error
Move data to a good spot
Mark the spot as bad
Disks should be scanned monthly
Defragment a disk
Files fragment when resaved
Fragmented files load slower
Defragment puts the fragments together
Disks should be defragged monthly
Scan a disk for errors
Bad spots on the media
Find and fix the error
Move data to a good spot
Mark the spot as bad
Disks should be scanned monthly
File compression
Shrinks the size of a file
Takes up less space on disk
Reduce a disks performance
Will increase disk capacity
PKZip, WinZip and WinRAR
MP3s are created using compression. If a audio song is recorded on a hard drive, the required storage is about 1 MB per second. When the MP3 compression is applied, the size is reduced to about 1 MB per minute.
Windows XP provides several compression routines. It provides for .zip file compression and archive creation. Zip archives can be accessed like normal folders. Folders can be compressed to shrink the contents. Finally, the entire disk can be compressed .