Premium Essay

Secondary Storage Devices

In:

Submitted By ddhidella
Words 742
Pages 3
Access Methods of Secondary Storage Devices Secondary Storage Device is storage medium which is used to store large amount of data permanently until it is changed by user. Though it stores information, it cannot be accessed directly by the CPU. The data stored in Secondary Storage Device can be accessed depending upon how it is stored on the device. Mainly there are two methods of accessing data from the Secondary Storage Device. 1) Sequential Access Method 2) Direct Access Method

Sequential Access Method – This means the computer system must search the storage device from the beginning until the desired data is found. The most common sequential access device is magnetic tape where data is stored and processed sequentially. For example, a tape contains information regarding students of a school, to look student’s number 100’s information, the computer will have to start with student number 1 and then go pass 2, 3, 4 and so on until it comes to 100. This method is quite simple than other methods, but it is very slow (more time for searching data) & very suitable for bills & payroll applications.
Direct Access Method – This is also known as random access, it means the computer can go directly to the location where the data is stored that the user wants. The most common direct access devices are magnetic disc & optical disc. In these devices, the data is stored as sequentially numbered blocks. Thus one can access block 12, then block 78, then block 5 & so on. This method is ideal for applications like airline reservation system or computer –based directory assistance operations

Secondary Storage Device | Access Method | Magnetic tape | Sequential accessAccess time is slower than hard drive | Magnetic Disk | Floppy disk | Direct accessAccess time is very slow | | Hard disk | Direct accessAccess time is very fast ( currently the

Similar Documents

Premium Essay

Information Systems

...helps decision makers achieve their organization’?s _____. a.|profits|c.|cost reduction initiatives| b.|goals|d.|quality improvement measures| ____ 6. ______ is a measure of the extent to which a system achieves its goals. a.|Efficiency|c.|Performance rate| b.|Reliability|d.|Effectiveness| ____ 7. In information systems, _____ is used to make changes to input or processing activities. a.|forecasting|c.|output| b.|feedback|d.|processing| ____ 8. _____ consists of computer equipment used to perform input, processing, and output activities. a.|Information technology|c.|Telecommunications| b.|Technology infrastructure|d.|Hardware| ____ 9. Keyboards, automatic scanning devices, and equipment that can read magnetic ink characters are examples of _____ hardware. a.|storage|c.|output| b.|processing|d.|input| ____ 10. _____ consists of computer programs that govern the operation of the computer....

Words: 3708 - Pages: 15

Premium Essay

History of Computer

...History of Computers Carving notches into bones • 20,000 BC to 30,000 BC • Oldest known objects used to represent numbers • Discovered in Western Europe, date from the Aurignacian period correspond to the first appearance of Cro-Magnon man (caves of the same name in Southern France, in which the first skeletons of this race were discovered in 1868.) Abacus • 1000-500 BC • First actual calculating mechanism • Babylonians or Chinese Mechanical Calculator • 1500 AD, Leonardo Da Vinci • First mechanical calculator Napier’s Bones • 1614, John Napier • Multiplication tables inscribed on strips of wood or bone • Multiply, divide, square roots John Napier • Scottish Mathematician • Laird of Merchiston Wilhelm Schickard • German Astronomer and Mathematician Slide Rule • 1625, William Oughtred • Multiplication and division, and “scientific" functions such as roots, logarithms and trigonometry, but is not normally used for addition or subtraction. Pascaline • 1642, Blaise Pascal • First digital calculator • Used to add and subtract Blaise Pascal- French mathematician, physicist and theologian. Step Reckoner • 1670, Gottfried von Leibniz • Addition, subtraction, multiplication, divide, evaluate square roots Gottfried von Leibniz • German Baron • Entered University at 15 years old and received his bachelor’s degree at 17 y.o. Punched Card Loom • 1801, Joseph Marie Jacquard •...

Words: 1499 - Pages: 6

Premium Essay

Techn

...White Paper WHAT’S NEW WITH TIMEFINDER FOR EMC SYMMETRIX VMAX Applied Technology for traditional and virtual environments Abstract This white paper describes the latest EMC® TimeFinder ® features available for traditional and virtual environments running open systems and using Symmetrix VMAX™. Throughout this paper the basis for “traditional environments” will describe hard disk drive or thick device technologies, and the basis for “virtual environments” will describe virtually provisioned thin device environments. June 2011 Copyright © 2011 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware is a registered trademark of VMware, Inc. All other trademarks used herein are the property of their respective owners. Part Number h8264 What’s New with TimeFinder for EMC Symmetrix VMAX 2 Table of Contents Executive summary .........................

Words: 5721 - Pages: 23

Premium Essay

Datavast Inc.: the Target Segment Decision

...1. Describe the data storage industry in China in this case. Include comments on technology and issues in accepting new technology? “Data storage devices allow users to store digital files in a secondary location in order to prevent the loss of important information. Such devices came in many forms, depending on the needs of the users” (Hao, 2012). Prior to the introduction of the data storage industry in China, approximately 20 percent of small to medium companies were still using CDs as their form of data backup, or other outdated methods, such as external hard drives. Some Chinese companies did not use any form of data back up at all. Even the larger companies’ back up systems that they were paying millions for were outdated. They used integrated back up systems to store their core data, while their non-core data was stored through outdated means. However the Chinese weren’t as receptive to Cloud storage initially, as they feared their data would be leaked, or that the cloud- storage providers would go bankrupt and disappear with all of their data. In China it was common for Client’s information to be sold by individuals working for service industries, and as a result companies did not “trust service providers with storing sensitive information” (Hao, 2012). 2. Compare the buying practices of small companies versus large companies with respect to backup technology. In respect to backup technology, there were clear differences between the buying practices...

Words: 1436 - Pages: 6

Premium Essay

Met Cs 669 Assignment 2.3 Iteration Example

... Table of Contents Introduction 1 Pluggable Storage Engines 1 Hardware 2 Application Patterns 4 Schema Design & Indexes 5 Disk I/O 6 Considerations for Amazon EC2 7 Considerations for Benchmarks 7 We Can Help 9 Resources 9 Introduction MongoDB is a high-performance, scalable database designed for a broad array of modern applications. It is used by organizations of all sizes to power on-line, operational applications where low latency, high throughput and continuous availability are critical requirements of the system. For a discussion on the architecture of MongoDB and some of its underlying assumptions, see the MongoDB Architecture Guide. For a discussion on operating a MongoDB system, see the MongoDB Operations Best Practices. This guide outlines considerations for achieving performance at scale in a MongoDB system across a number of key dimensions, including hardware, application MongoDB Pluggable Storage Engines patterns, schema design and indexing, disk I/O, Amazon EC2, and designing for benchmarks. While this guide is broad in scope, it is not exhaustive. Following the recommendations in this guide will reduce the likelihood of encountering common performance limitations, but it does not guarantee good performance in your application. MongoDB 3.0 exposed a new storage engine API, enabling the integration of pluggable storage engines that extend MongoDB with new capabilities,...

Words: 5233 - Pages: 21

Free Essay

Datavast Case

...illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Richard Ivey School of Business Foundation prohibits any form of reproduction, storage or transmission without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Richard Ivey School of Business Foundation, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2012, Richard Ivey School of Business Foundation Version: 2012-06-08 It was December 2011, and Winston Hao, founder and general manager of Datavast Inc. (Datavast), was deep in thought as he gazed out the window of his Beijing office with a cup of his favourite tea in hand. He was both excited and anxious about his company’s prospects for the future. Since the company’s inception five years ago, Hao had heavily invested time, energy, and money into building this company, which designed, manufactured, and sold cloud storage products – that is, products that stored large amounts of digital data. After recently making major adjustments to the original product, Hao’s company was finally ready to push its newly revamped product onto the market. The only question was: Who should...

Words: 3235 - Pages: 13

Premium Essay

Seagate 10k

...SEAGATE TECHNOLOGY PLC FORMReport) 10-K (Annual Filed 08/08/13 for the Period Ending 06/28/13 Telephone CIK Symbol SIC Code Industry Sector Fiscal Year (353) (1) 234-3136 0001137789 STX 3572 - Computer Storage Devices Computer Storage Devices Technology 06/30 http://www.edgar-online.com © Copyright 2013, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Use these links to rapidly review the document TABLE OF CONTENTS PART IV Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended June 28, 2013 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File No. 001-31560 SEAGATE TECHNOLOGY PUBLIC LIMITED COMPANY (Exact name of registrant as specified in its charter) Ireland (State or other jurisdiction of incorporation or organization) 38/39 Fitzwilliam Square Dublin 2, Ireland (Address of principal executive offices) Registrant's telephone number, including area code: (353) (1) 234-3136 98-0648577 (I.R.S. Employer Identification Number) Securities registered pursuant to Section 12 (b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Ordinary Shares, par value $0.00001 per share The NASDAQ...

Words: 96245 - Pages: 385

Free Essay

Removable Media Policy

...The purpose of this policy is to define standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable removable media to any infrastructure within Richman Investments internal network or related technology resources. This removable media policy applies to, but is not limited to all devices and accompanying media that fit the following device classifications: • Portable USB-based memory sticks, also known as flash drives, thumb drive, jump drives, or key drives. • Memory cards in SD, CompactFlash, Memory Stick, or any related flash-based supplemental storage media. • USB card readers that allow connectivity to a PC. • Portable MP3 and MPEG-playing music and media player-type devices such as IPods with internal flash or hard drive based memory that supports a data storage function. • PDAs, cell phone handsets, and smart phones with internal flash or hard drive based memory that support a data storage function. • Digital cameras with internal or external memory support. • Removable memory based media, such as DVDs, CDs, and floppy disks. • Any hardware that provides connectivity to USB devices through means such as wireless (Wi-Fi, WiMAX, IrDA, Bluetooth, among others) or wired network access. This policy applies to any hardware and related software that could be used to access corporate resources, even if said equipment is not corporately sanctioned, owned, or supplied. The overriding goal of this policy is to protect the...

Words: 1274 - Pages: 6

Premium Essay

Perform a Byte-Level Computer Audit

...external media? If so, why is this important during a computer forensic investigation? yes you because that way you are not installing anything on the hard drive that would alter the state of the drive. 4. Why would you use a tool like DevManView while performing a computer forensic investigation? It allows you to see all the the things that are installed on your system from the operating system to the drivers and what version is on there. Determining times and dates, what flash/jump drives might be plugged in, and any CDs, DVDs, or Blu-Ray disks are in the disk drives. 5. Which item(s) within DevManView’s list would you consider to be of critical importance in a computer forensic investigation? Optical Drive(s), USB Mass Storage Devices 6. What tool similar to DevManView is already present in Microsoft Windows systems? WinHEX 7. Why would someone using a HEX editor during a forensic investigation? Determining deliberately mislabelled files attempting to hide. 8. What is the purpose of a software tool like WinHEX in computer forensics? Closely examining a file to determine if it’s actually what it appears to...

Words: 366 - Pages: 2

Premium Essay

Application Software

...A hard disk drive (HDD; also hard drive, hard disk, or disk drive)[note 2] is a data storage device used for storing and retrieving digital information from non-volatile memory (retaining its data even when powered off) in a random-access manner (data can be retrieved in any order rather than just sequentially). An HDD consists of one or more rigid ("hard") rapidly rotating discs (platters) coated with magnetic material, with magnetic heads arranged on a moving actuator arm to read and write data to the surfaces. An optical disk drive uses laser technology to write data to and read data from an optical disk. The optical disk drives use removable media. The following are the different types of optical disk drives: * Library-resident (in 3995 libraries) * Operator-accessible (3995) * Multifunction (library resident or operator-accessible in all 3995 models except 3995-131 and 3995-132) A USB flash drive is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Disk partitioning is the act of dividing a hard disk drive into multiple logical storage units referred to as partitions, to treat one physical disk drive as if it were multiple disks. Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive Backup and Restore[1]...

Words: 359 - Pages: 2

Free Essay

Formatting in Word

...getting used to the new version, things start to clear up, but it does take time. This is no to say that the new versions are bad, but sometimes there really doesn’t need to be any changes. If it’s not broke, don’t fix it. Also, another issue I sometimes notice which may lead to problems is that now there are so many options. I understand sometimes there is a need to have graphic designs or special fonts, but wouldn’t you want to use a special program for that? I feel sometimes less is best and it keeps things simple and less room for error. Interesting fact about formatting, in the world of Information Technology, the term “formatting” can have several different meanings. • Disk formatting “the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive” (Disk formatting, 2013) • File formatting “tells the computer how to display, print, and process, and save the data” (File format, 2013). • Page formatting “describe the page layout or style of text in a word processing document. When you format the layout of a page, you can modify the page...

Words: 418 - Pages: 2

Free Essay

Computer Lab 1

...computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). Memory Stick Slot Micro Drive Slot Compact Flash Slot Secure Digital Slot 1. Explain the diagram or photo(s) with the name of each type of memory slot. Memory Stick – is a removable flash memory card format. Electronic flash memory data storage device. Micro Drive- is an extremely small hard disk that can fit in a compact card memory slot. Compact flash- is a flash memory mass storage device used mainly in portable electronic devices. Secure digital- is a non-volatile memory card used extensively in portable devices. Task 3: Identify the Configuration Procedure 1. Identify the following configuration. When a SCSI host adapter card with internal and external connection is used, the SCSI daisy chain can extend through the card. The devices on each end of the chain are terminated, and each device has a unique device id number. 2. Define a SCSI and the need to use a SCSI Controller. SCSI small computer systems interface is a very flexible interface because it can accommodate many devices in addition to hard disk drives used for mass storage. Task 4: Identify the Color Codes Procedure Most recent systems and sound cards...

Words: 392 - Pages: 2

Free Essay

It Didn't Have the Data

...1.1 Purpose and Scope The information security concern regarding information disposal and media sanitization resides not in the media but in the recorded information. The issue of media disposal and sanitization is driven by the information placed intentionally or unintentionally on the media. Electronic media used on a system should be assumed to contain information commensurate with the security categorization of the system’s confidentiality. If not handled properly, release of these media could lead to an occurrence of unauthorized disclosure of information. Categorization of an information technology (IT) system in accordance with Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems1 , is the critical first step in understanding and managing system information and media. Based on the results of categorization, the system owner should refer to NIST Special Publication (SP) 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations2 , which specifies that “the organization sanitizes information system digital media using approved equipment, techniques, and procedures. The organization tracks, documents, and verifies media sanitization and destruction actions and periodically tests sanitization equipment/procedures to ensure correct performance. The organization sanitizes or destroys information system digital media before its disposal...

Words: 3672 - Pages: 15

Premium Essay

Pm Lesson

...Working with Image Files (IMG and ISO) 2015-02-03 Version 3.0 TABLE OF CONTENTS ISO and IMG Files ......................................................................................................................................... 2 What is an IMG or ISO File? ............................................................................................................... 2 32-Bit vs 64-Bit .................................................................................................................................... 2 Bootable Installation Packages ..................................................................................................................... 3 Package? Image? Disk/Media? .......................................................................................................... 3 Bootable Installation Package ............................................................................................................ 3 What do I do with My Installation Package? ....................................................................................... 4 Preparing Physical Media from a Bootable Installation Image ..................................................................... 5 Requirements ...................................................................................................................................... 5 Creating Bootable DVD Media ................................................................................

Words: 1800 - Pages: 8

Free Essay

Video Summary

...memory modules or continuity (C-RIMM) modules. Earlier RAM had an extra bit known as parity bit to check for errors. Unfortunately, it would only detect if a bit was bad or good without a way to fix it. ECC is used in modern memory to correct memory errors at the bit level and correct any problems it may find. There are magnetic, optical, and solid state storage devices. Floppy disks and hard drives are magnetic storage devices. If exposed to a magnet data loss may result. Hard drives have a 137 GB limit. You must flash the BIOS to upgrade it and it will allow it to support a larger number of hard drive addresses. The Hard drive interfaces to attach to the motherboard are PATA/IDE, SATA, SCSI, USB, and FireWire. Along with hard drives, parallel ATA (PATA) and serial ATA (SATA) are also used for CD drives, DVD drives and tape drives. The two power supply connections are Molex and Berg. Molex connections are larger and are used for hard drives, CD drives, and DVD drives. Berg connections are smaller and are used for floppy drives. The floppy drive cable has a twist to distinguish it from the IDE cable. Optical storage devices include CD and DVD...

Words: 358 - Pages: 2