Modern computers employ a hierarchy of storage devices which may be broadly divided into two categories: ‘primary’ and ‘secondary’ systems.
What is secondary storage? The bulk of data can’t be stored in the main memory as this memory is costly and naturally some other cheaper memory devices are required. These cheaper memory devices, called Secondary Storage Devices can store bulk of data at very less cost.
Devices such as flash memory, the hard disk, floppy disk, and writable optical disk, provide with examples of secondary storage devices. These offer larger storage capacity than primary storage devices, but operate more slowly. Flash RAM, sometimes embedded within solid-sate drives, provides the fastest access at the highest cost. Optical discs offer the slowest but cheapest storage method.
The secondary stored devices allow permanent storage of data and instructions. The data stored on a secondary storage device can be accessed, depending upon how it its stored on the device.
The benefits of secondary storage including:
*Non-Volatility
*Large capacity
*Reliable
*Convenience
*Low cost
*Re-usability
*Portability
Secondary storage devices
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
Enterprise communications and collaboration application support communication, coordination, and collaboration among the members of busines...
-
In today’s highly competitive global market place, small business owners need every edge they can get. Intranet refers to an internal networ...
-
For many firms, the competitive nature of today’s business environment has brought home the realization that strategic advantage will accrue...
-
Minicomputers Minicomputers are most powerful than microcomputers in terms of multiples user environments. In other words, a minicomput...
-
Identity authentication is the foundation of the whole information safety system. It’s first defense line of network security, also the most...
