• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Storage Peripherals

Extracts from this document...

Introduction

Essay A01C(i) - Input / Output Peripherals Storage Peripherals Memory:- SD-RAM - Single Data Random Access Memory is commonly used in computers for temporary storage of data. Because it needs a constant power source to contain stored data, it loses all information it contains when the power is cut or the computer is turned off. Its access time is measured in nanoseconds (ns) because the time it takes to access data, change a 1 to a 0 or 0 to a 1 is so small. It comes in specifications of PC100, PC133, PC166, PC200, PC233 and PC266, the best specification being PC266. DIMM - This type of memory is specially designed for 128 pin DIMM memory slots. The advantage of this is that more information can be transferred at one time and more information stored on one slot. DD-RAM - Double Data Random Access Memory is twice as fast as Single Data RAM because two sets of information are transferred at one time. One disadvantage of this type of storage is that it needs a double data processor to comprehend the transfer of data. ...read more.

Middle

It uses floppy disks that range from 1.44 to 2.88 megabytes in capacity and can be double sided. 51/4 Inch Floppy Drive:- This was one of the first removable storage devices made and is very rare these days because of its low performance and little capabilities. The disks for this device are usually only 218 kilobytes in capacity. Cassette Drive:- This is one of the earliest forms of removable storage dating back to the first computers where data was stored on the magnetic ribbon of cassette tapes. One of the earliest examples of this was the Commodore 64 entertainment system. However this idea of storage was soon scrapped due to the unreliability of the length of time that data could be accurately stored on the cassette. Deterioration or variation of the magnetic field produced by the ribbon causes binary 1's or 0's to be read as their opposites, therefore data would become corrupt in a short space of time. These days cassettes are used for the storage of audio data. ...read more.

Conclusion

These are very small devices designed for almost instant storage of data. This method of storage has not long been researched but is used in many communication devices such as mobile phones (sim cards), and phone cards. This gold coloured chip can usually only contain upto 1Mb of information but is used because of its speed as a storage device and because it is so small. Input & Output Peripherals (Listed) Bus Devices 3D Accelerators / Graphics Cards Display Adapters Global Positioning Devices Human Interface - eg. Touchscreen Monitors Devices Specialised Audio Controlls Device Specifically Designed For Human Use Imaging Devices - eg. Scanners Digital Cameras Ion Cameras Digital Camcorders Laser Detection Devices Infrared Devices Keyboards Comunication - eg. Modems Devices Ethernet Adapters LAN, ISDN, ADSL Connection Devices Display Devices - eg. TFT Monitors CRT Monitors Plasmascreens VGA Monitors SVGA Monitors CTX Monitors Monochrome Monitors PVGA Monitors Liquid Crystal Displays (LCD) Mouse Network Adapters PCMCIA Cards Printers SCSI Controller Cards Sound Cards Game Controllers - eg. Joypads Joysticks Flight Yokes Hat Controllers Steering Wheels + Pedals System Devices - eg. Advanced Configuration Devices Power Interface Bios Plug and Play BIOS USB Hubs Ports - eg. Com (1-65536) LPT Serial Digital ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    In electronics, a signal is an electric current or electromagnetic field that is used to convey data from one place to another. The simplest form of signal is a direct current (DC) that is switched on and off; this is the principle by which the early telegraph worked.

  2. White Soul System Designs - creating a computer system.

    * Hardware Needed 1. Pc with an 800mhz processor and a 16mb graphics card. At least 1gb hard disk. Reason: This will be used to run the system and save information to the hard disk for future reference and/or amending.

  1. Statistics - How good are people's memory considering different factors?

    This is projected by an Over-Head Projector to a portion of a sample that is big enough to allow for as little repetition as necessary and small enough, to allow for everyone in the portion to view the projection with clearness.

  2. File transfer protocols

    Description Interface Description No. Calling Module Called Module Parameters 0 Songs Set_Up Songs_Table In/Out 2 Set_Up Initialise Songs_Table In/Out 3 Set_Up Load Songs_Table In/Out 4 Songs Process_Votes Songs_Table In/Out Total Votes In/Out 5 Songs Menu Songs_Table In Total_Votes In 6 Menu Display Songs_Table In Report Songs_Table In Total_Votes In 3.

  1. Smart Card System

    * Authentication- The sender and receiver can identify each other's identity and the origin or destination of the information. 2.2 DES (Data Encryption Standard) and Implementation DES is the U.S. Government's Data Encryption Standard, a product cipher that operates on 64-bit blocks of data, using a 56-bit key.

  2. "Smart Cards "

    On a card it controls the way data is stored, accessed and updated. Card Terminal: Smart Cards require special readers to read/write data, called Card terminals. This is the hardware aspect of reading smart cards. The reader is just responsible for extracting information from the smart card and passing it to the processing software.

  1. Flexible Architectures in Communication Security Application

    We discuss the operations of strong secret-key ciphers by carefully examining the Twofish cipher in Chapter 2. In Chapter 3, we present our experimental framework and analyses of cipher kernel characterizations, operations, and bottlenecks to gain insight as to how to build efficient designs.

  2. Graphics Cards or Display Adapters

    The three most popular printers in use are inkjets, lazes and plotters. Inkjet printers wok by firing ink though tiny holes onto paper. Whilst the best versions can print near photo quality resolutions on special paper they generally slow and for home o small business use.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work