Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate working of Magnetic Bubble Memories?
In many materials like garnets on applying magnetic fields certain cylindrical areas whose direction of magnetization is opposite to that of magnetic field are created. These are known as magnetic bubbles. Diameter of these bubbles is found to be in range of 1 micrometer. These bubbles can be moved at high speed by applying a parallel magnetic field to plate surface. So rotating field can be produced by an electromagnetic field and no mechanical motion is needed.
In these devices deposition of a soft magnetic material known as Perm alloy is made as a predetermined path so making a track. Bubbles are forced to move continually in a fixed direction on these tracks. In these memories presence of a bubble signifies a 1 while absence signifies a 0 state. For writing data in a cell a bubble generator to introduce a bubble or a bubble annihilator to eliminate a bubble are needed. A bubble detector performs read operation. Magnetic bubble memories having capacities of 1M or more bits per chip have been created. Performance and cost of these memories fall between semi-conductor RAMs and magnetic disks.
These memories are non-volatile in comparison to semi-conductor RAMs. Additionally because there are no moving parts they are more reliable than magnetic disk. However these memories are hard to manufacture and hard to interface with in conventional processors. These memories at present are used in specialized applications for example like a secondary memory of air or space borne computers where very high reliability is needed.
Access to External Identifiers: An external identifier is one which is referred in one module though defined in another. You can declare an identifier to be external by including i
Q. What is control function? If transfer is to take place only under a predetermined control condition then this condition can be specified as a control function. For illustrat
Define the term- Verification It is a way of preventing errors when data is copied from one medium to another (for instance from paper to disk/CD or from memory to DVD, etc.).
Q. Explain Physical Characteristics of magnetic disk? Figure below lists main features that differentiate among different types of magnetic disks. First head may either be fixe
The 2's complement of the number 1101110 is ? Ans. 1's complement of 1101110 is = 0010001 ans hence 2's complement of 1101110 is = 0010001 + 1 = 0010010.
Two Layer Artificial Neural Networks: However decision trees are whenever powerful they are as a simple representation scheme. Whereas graphical on the surface that they can b
What are the two types of branch prediction techniques available? The two types of branch prediction methods are 1) Static branch prediction 2) Dynamic branch predicti
Determine the term - ARTiSAN Software and BridgePoint ARTiSAN Software : This provides a variety of UML based CASE tools, which also includes a real time modeling tool.
What is port? What are the types of port available? An I/O interface having of circuitry needed to connect an I/O device to computer bus. One side consists of a data path with
Q. How to use an Assembler? Symbolic instructions which we code in assembly language is called as- Source program. An assembler program translates source program in machine
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd