• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Storage Peripherals

Extracts from this document...

Introduction

Essay A01C(i) - Input / Output Peripherals Storage Peripherals Memory:- SD-RAM - Single Data Random Access Memory is commonly used in computers for temporary storage of data. Because it needs a constant power source to contain stored data, it loses all information it contains when the power is cut or the computer is turned off. Its access time is measured in nanoseconds (ns) because the time it takes to access data, change a 1 to a 0 or 0 to a 1 is so small. It comes in specifications of PC100, PC133, PC166, PC200, PC233 and PC266, the best specification being PC266. DIMM - This type of memory is specially designed for 128 pin DIMM memory slots. The advantage of this is that more information can be transferred at one time and more information stored on one slot. DD-RAM - Double Data Random Access Memory is twice as fast as Single Data RAM because two sets of information are transferred at one time. One disadvantage of this type of storage is that it needs a double data processor to comprehend the transfer of data. ...read more.

Middle

It uses floppy disks that range from 1.44 to 2.88 megabytes in capacity and can be double sided. 51/4 Inch Floppy Drive:- This was one of the first removable storage devices made and is very rare these days because of its low performance and little capabilities. The disks for this device are usually only 218 kilobytes in capacity. Cassette Drive:- This is one of the earliest forms of removable storage dating back to the first computers where data was stored on the magnetic ribbon of cassette tapes. One of the earliest examples of this was the Commodore 64 entertainment system. However this idea of storage was soon scrapped due to the unreliability of the length of time that data could be accurately stored on the cassette. Deterioration or variation of the magnetic field produced by the ribbon causes binary 1's or 0's to be read as their opposites, therefore data would become corrupt in a short space of time. These days cassettes are used for the storage of audio data. ...read more.

Conclusion

These are very small devices designed for almost instant storage of data. This method of storage has not long been researched but is used in many communication devices such as mobile phones (sim cards), and phone cards. This gold coloured chip can usually only contain upto 1Mb of information but is used because of its speed as a storage device and because it is so small. Input & Output Peripherals (Listed) Bus Devices 3D Accelerators / Graphics Cards Display Adapters Global Positioning Devices Human Interface - eg. Touchscreen Monitors Devices Specialised Audio Controlls Device Specifically Designed For Human Use Imaging Devices - eg. Scanners Digital Cameras Ion Cameras Digital Camcorders Laser Detection Devices Infrared Devices Keyboards Comunication - eg. Modems Devices Ethernet Adapters LAN, ISDN, ADSL Connection Devices Display Devices - eg. TFT Monitors CRT Monitors Plasmascreens VGA Monitors SVGA Monitors CTX Monitors Monochrome Monitors PVGA Monitors Liquid Crystal Displays (LCD) Mouse Network Adapters PCMCIA Cards Printers SCSI Controller Cards Sound Cards Game Controllers - eg. Joypads Joysticks Flight Yokes Hat Controllers Steering Wheels + Pedals System Devices - eg. Advanced Configuration Devices Power Interface Bios Plug and Play BIOS USB Hubs Ports - eg. Com (1-65536) LPT Serial Digital ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    Smart card has a small yet powerful computer built into it. This computer allows the card to interact with the card reader. Some cards such as the Schlumberger Cryptoflex perform cryptographic functions such as key and certificate verification, encryption, random number generation, etc.

  2. Flexible Architectures in Communication Security Application

    RC4 benefits from significantly more parallelism than the other algorithms. The algorithm is essentially a key-based random number generator that XOR's a random sequence onto the input stream. The iterations of the random number generator are (mostly) independent, al-lowing its execution to fully saturate a wide machine, resulting in very high-bandwidth encryption.

  1. "Smart Cards "

    On a card it controls the way data is stored, accessed and updated. Card Terminal: Smart Cards require special readers to read/write data, called Card terminals. This is the hardware aspect of reading smart cards. The reader is just responsible for extracting information from the smart card and passing it to the processing software.

  2. Graphics Cards or Display Adapters

    The three most popular printers in use are inkjets, lazes and plotters. Inkjet printers wok by firing ink though tiny holes onto paper. Whilst the best versions can print near photo quality resolutions on special paper they generally slow and for home o small business use.

  1. Software Configuration

    Excel would be very useful. Using mathematical, as well as its advanced functions, we can achieve our desired objectives. In this program, data and formulas to calculate those data are entered into the spreadsheets/worksheets and from there we can analyze, validate and sort the data.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    into one of Onyx Internet's Points of Presence (POP), this type of service provides a fast link out onto the Internet. Leased Lines are suitable for heavy Internet users and they can easily be upgraded as Internet usage or traffic flow increases.

  1. File transfer protocols

    Writeln( 'Menu') End; (* Menu *) (* 0 - Songs *) (* calls Set_Up to load song details into the table, Process_Votes to input votes and collate them, and Menu to offer options *) Var Songs_Table : Songs_Table_Type; Total_Votes : PosInt; Begin (* Songs *)

  2. Primary or Secondary Storage.

    There are two main types of RAM used in computer systems: 1. DRAM- this memory is based on capacitor technology and requires the contents of each storage cell within the chip to be periodically refreshed (about every 4 milliseconds). It consumes very little power, but suffers from slow access time.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work