Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about hard drives?
Disks are generally mounted on a disk drive which comprises of an arm and a shaft along with electronic circuitry for read-write of data. Disk rotates along with shaft. A non-removable disk is permanently mounted on disk drive. One of most significant illustration of a non-removable disk is hard disk of PC. Disk is a platter coated with magnetic particles. Early drives were large. Later on smaller hard (rigid) disk drivers were created with fixed and removable pack. Every pack held about 30MB of data and became called as the Winchester drive. Storage capacity of today's Winchester disks is typically of order of a few tens of Megabytes to a few Gigabytes. Most Winchester drives have subsequent common aspects:
(a) An Open Disk Casing
(b) Tracks and Cylinders
Figure: The Hard Disk
What is the advantage of buffering? Is buffering always effective? Justify your answer with help of an example. I/O buffer: One type of input-output requirement arises from d
Explain in detail companding. Companding: It is the process of compressing and expanding. This includes compressing the signal at the transmitter and expanding this at the re
In how many ways line of code of assembly language can be divided? A line of code of an assembly language program can be divided in three columns called as fields. The fields d
State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u
A stationary random displacement signal was digitised at 64 samples a second and analysed to obtain an auto-spectral density. The signal was calibrated in mm units. The frame siz
Communication by devices, such as the HC11 processor, is a key and vital part of most systems that are used in military, commercial, and academic settings. In fact, most of these
PVM is mainly a simulation of a computer machine running parallel programs. It is a software package that allows a heterogeneous collection of UNIX and/or Windows computers hooked
The while Loop The while loop repeats a statement until the test at the top proves false. As an example, here is a function to return the length of a string. int string_leng
Define Word/byte rotation and XOR bit masking encryption technique to make sure secured transactions on the net? Word/byte rotation and XOR bit masking: In this process t
define multipoint communication
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd