Disc shapes and diameters - computer architecture, Computer Engineering

Assignment Help:

Disc shapes and diameters:

 

364_Disc shapes and diameters.png

 

A Mini-CD is 8 centimeters in diameter.

The digital data on a CD start at the center of the disc and proceeds toward the edge, which permit adaptation to the different size formats available. Normal CDs are available in 2 sizes. The most common size is 120 mm in diameter, with a 74- or 80-minute audio facility and a 650 or 700 MB data capacity. This diameter has also been adopted by afterward formats, including Super, DVD, CD, Audio, HD DVD, and Blu-ray Disc. 80 mm discs ("Mini CDs") were initially designed for CD singles and can store to 21 minutes of music or 184 MB of data but never really became famous. Today, nearly every single is released on a120 mm CD, known as a Maxi single.


Related Discussions:- Disc shapes and diameters - computer architecture

Show example of copy command, Q. Show example of COPY command? This COP...

Q. Show example of COPY command? This COPY command copies the REPORT file from the drive C to the disk in drive A. after copying the file in drive A, it will name the new file

Find the physical address of instruction, Q. Find the Physical address of i...

Q. Find the Physical address of instruction? Value of Instruction Pointer and holding address of instruction = 1234h Value of code segment register (CS) = 448Ah Physical

Explain error detection and correction codes, Q. Explain Error Detection an...

Q. Explain Error Detection and Correction Codes? Before we wind up data representation in reference of today's computers one should determine about code that helps in correctio

Coupling and cohesion, Coupling and cohesion can be shown using a:- Dep...

Coupling and cohesion can be shown using a:- Dependence matrix

Integrated test result, COGNITIONS Mr. X exhibits a generally high-quali...

COGNITIONS Mr. X exhibits a generally high-quality level of cognitive and intellectual functioning, as evidenced by his performance on the MMSE-2 and WAIS-IV. His one weakness w

What is actor, What is actor? An actor is a direct external user of a s...

What is actor? An actor is a direct external user of a system. Every actor shows objects that behave in a particular way towards systems. Actors are directly linked to system.

Explain the technique used in asymmetric key cryptography, Explain the tech...

Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound

What is a deadlock, What is a Deadlock? Deadlock is a situation, in th...

What is a Deadlock? Deadlock is a situation, in that processes never complete executing and system resources are tied-up, preventing another job form starting. If the resou

Congestion in network layer, explain different types of congestion in netwo...

explain different types of congestion in network layer?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd