Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is typical storage hierarchy?
A typical storage hierarchy is displayed in Figure above. Though Figure shows only block diagram however it includes storage hierarchy:
Register
Cache memory
Main memory
Secondary Storage and
Mass Storage.
As we move up hierarchy we encounter storage elements which have faster access time and higher cost per bit stored as well as slower access time as a result of moving down hierarchy. So cache memory normally has the fastest access time and the smallest storage capacity as well as the highest cost per bit stored. Primary memory (main memory) falls next in storage hierarchy list. On-line, direct-access secondary storage devices like magnetic hard disks make up level of hierarchy just below main memory. Off-line, direct-access and sequential access secondary storage devices like magnetic tape, ZIP disk, Floppy disk and WORM disk etc. fall next in storage hierarchy. Mass storage devices generally referred to as archival storage are at the bottom of storage hierarchy. They are cost-effective for storage of very large quantities of data when fast access time is not essential.
Please note two significant points here:
What are the types of Subroutines? Internal Subroutines: The source code of the internal subroutines will be in the similar ABAP/4 program as the calling procedure (intern
A Scrollbar is a Component, but not a Container while Scrollpane is a Container and handles its own events and do its own scrolling.
Approach to reasoning - first-order logic: The formal approach to reasoning has bigger return and disadvantages. In generally we notice, if a computer program has proved somet
How do we merge an image from a file to the current image in GIMP? Ans) Use "File then Open as Layers" menu command or just take the file to a window and drop it there. The file w
* Public, protected and private are 3 access specifier in C++. * Public data members and member functions are accessible outside the class. * Protected data members and memb
In a two stage network there are 512 inlets and outlets, r=s=24. If the probability that a given inlet is active is 0.8, calculate: Blocking probability Given: N =M =512,
Illustrate about object oriented development object oriented development is not direct way of system development as in this approach a holistic view of application domain is co
Compact Disc; Compact Disc ( CD) is an optical disc which is used to store digital data. It was initially developed to store sound recordings completely, but later it als
Discuss its advantages over the other evaluation techniques. The expression tree is determined by using a post-order traversal of the expression tree as given here: 1. If such
Describe carry look-ahead adder? Ans: The input carry required by a stage is directly computed from carry signals obtained from all of the preceding stages i-1,i-2,.....0, rat
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd