...512 bytes). The 4096-bit Selectron was 10 inches long and 3 inches wide. Originally developed in 1946, the memory storage device proved expensive and suffered from production problems, so it never became a success. Above: The 1024-bit Selectron. Punch cards Early computers often used punch cards for input both of programs and data. Punch cards were in common use until the mid-1970s. It should be noted that the use of punch cards predates computers. They were used as early as 1725 in the textile industry (for controlling mechanized textile looms). Above: Card from a Fortran program: Z(1) = Y + W(1) Above left: Punch card reader. Above right: Punch card writer. Punched tape Same as with punch cards, punched tape was originally pioneered by the textile industry for use with mechanized looms. For computers, punch tape could be used for data input but also as a medium to output data. Each row on the tape represented one character. Above: 8-level punch tape (8 holes per row). Magnetic drum memory Invented all the way back in 1932 (in Austria), it was widely used in the 1950s and 60s as the main working memory of computers. In the mid-1950s, magnetic drum memory had a capacity of around 10 kB. Above left: The magnetic Drum Memory of the UNIVAC computer. Above right: A 16-inch-long drum from the IBM 650 computer. It had 40 tracks, 10 kB of storage space, and spun at 12,500 revolutions per minute. The Hard Disk Drive The first hard disk drive was the IBM Model...
Words: 767 - Pages: 4
...Access Methods of Secondary Storage Devices Secondary Storage Device is storage medium which is used to store large amount of data permanently until it is changed by user. Though it stores information, it cannot be accessed directly by the CPU. The data stored in Secondary Storage Device can be accessed depending upon how it is stored on the device. Mainly there are two methods of accessing data from the Secondary Storage Device. 1) Sequential Access Method 2) Direct Access Method Sequential Access Method – This means the computer system must search the storage device from the beginning until the desired data is found. The most common sequential access device is magnetic tape where data is stored and processed sequentially. For example, a tape contains information regarding students of a school, to look student’s number 100’s information, the computer will have to start with student number 1 and then go pass 2, 3, 4 and so on until it comes to 100. This method is quite simple than other methods, but it is very slow (more time for searching data) & very suitable for bills & payroll applications. Direct Access Method – This is also known as random access, it means the computer can go directly to the location where the data is stored that the user wants. The most common direct access devices are magnetic disc & optical disc. In these devices, the data is stored as sequentially numbered blocks. Thus one can access block 12, then block 78, then block 5 &...
Words: 742 - Pages: 3
...Dear Management, I am writing this letter to inform you of the advantages of using external mass storage versus DVD-ROM dual layer drives. First point external mass storage devices such as external hard drives allow more data to be stored onto one medium versus a DVD-ROM. External hard drives come in all sizes from 128GB drives to 3TB in size, while the DVD-ROM dual layer discs max storage capacity is only 8.5GB. Another reason to go with a mass storage device would be for ease of access to data, with DVD-ROM’s one would have to physically search for different media and figure out what data is needed which is time consuming and tedious. On the other hand, with a mass storage device such as an external hard drive one could simply browse or do a quick search on the device and within minutes locate the information or data needed. External mass storage is the future, storage mediums such as CD’s and DVD’s are becoming outdated, technologies such as USB flash drives, SD cards, and external hard drives to name a few have been taking over the market. A factor to consider for justifying the use of mass storage versus DVD-ROM’s is data storage and retention. With DVD-ROM disc with time, they may get scratch unintentionally over time, and the material will deteriorate depending on storage conditions, external hard drives on the other hand are less prone to these types of faults and can last for many years. Another advantage of using external hard drives would be data transfer...
Words: 332 - Pages: 2
...NT1110 Mr. Khan Nicole Snyder Kat Genovesio STORAGE DEVICES Installing a new hard drive requires creating partitions, formatting partitions before installing operating system. Hard drives are comprised of platters, have read/write heads on top and bottom for each platter. Since they are coated with magnetic film, which contain the bits, they should never be exposed to a magnet as it may result in data loss. Hard drives and gilded to protect their data, but floppy disks are not. The BIOS can be flashed to upgrade the system. The hard drives can attach to the motherboard using different interfaces, such as PATA, SATA, SCSI, USB, and FireWire; PATA (Parallel ATA) interface is most commonly used and is sometimes referred to as IDE or EIDE. The IDE (PATA) cable has 2 connector which are master and slave, the motherboard supports 2 cables which are primary and secondary. The motherboard can support 4 devices total (primary master/slave and secondary master/slave). The motherboard connector may be color coded, blue is primary and black is second. The cable connectors may also be color coded, blue goes into motherboard (regardless of primary or secondary), black goes to first device and grey is second device. The jumpers on the drive determine the master/slave designation. The hard drive should be installed as master on the primary cable, other devices should be second to improve performance. The cords have improved from 40 pin/40 wires to 40 pin/80 wires (the extra wires are...
Words: 777 - Pages: 4
...How Speed of a Computer Is Affected By Different Storage Devices Traci Benge CIS/201 May 7, 2012 Charles Jacks Abstract Today’s computers have different ways to store data. Some examples of these ways are devices as the hard disk (aka magnetic disk), floppy disk, RAM, CD ROM, tape, and the flash (aka jump drive, USB memory stick, and thumb drive). Storage devices come in two different sources; primary or secondary. Each of these devices causes the computer to process data at different speeds. This paper will show how each of these devices store data and how they affect the speed of the computer. How Speed of a Computer Is Affected By Different Storage Devices The hard disk of a computer is a secondary type of storage. It can be either an external or internal source of storage for a computer. It is primarily to store a mass amount of data. The data remains stored on the hard disk indefinitely until permanently deleted. The hard disk stores the operating systems and application instructions. Without the hard disk the computer would not know how to open any of its operating systems or any of the other applications for the user. In this RAM (Random Access Memory) works with the hard disk. RAM is part of the primary storage; it contains a software program with small amounts of data for processing. When the computer boots up, it loads the whole program from the hard disk through RAM. Its storage capabilities get larger the farther away it is from...
Words: 1119 - Pages: 5
...Video 1.06 There are many types of storage devices. They include PATA, SATA, SCSI, USB, CD, DVD, flash drive, floppy drives, solid state removable and tape drive. They all used different types of connectors. Topics * PATA * SATA * SCSI * USB * CD * DVD Terms * PATA means Parallel Advanced Technology Attachment * SATA means Serial Advanced Technology Attachment * SCSI means Small Computer System Interface. It fast, more expensive and complex configuration than a USB. * USB means Universal Serial Bus * CD means Compact Disk * DVD means Digital Video Data There are a lot of ways to store information and upgrade your system. It is best to connect the motherboard to one cable by its self. There are two type of power supply. They are the Molex and Berg. The IEEE 1394 is supposed to replace the SCSI. It would be good to wire the computers in the office into one main tower. Video 1.08 They are two types of memory in the computer. They are the ROM and RAM. They are many different types for each type. Tropics * ROM * RAM * SRAM * DRAM * SIMM * DIMM * RIMM * SDRAM * DDR * DDR2 * ECC Terms * ROM means read only memory * RAM means random access memory * SRAM means Static random access memory * DRAM means dynamic random access memory * SIMM means single in-line memory module * DIMM means dual in-line memory module * RIMM means rambus in-line...
Words: 290 - Pages: 2
...The purpose of this policy is to define standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable removable media to any infrastructure within Richman Investments internal network or related technology resources. This removable media policy applies to, but is not limited to all devices and accompanying media that fit the following device classifications: • Portable USB-based memory sticks, also known as flash drives, thumb drive, jump drives, or key drives. • Memory cards in SD, CompactFlash, Memory Stick, or any related flash-based supplemental storage media. • USB card readers that allow connectivity to a PC. • Portable MP3 and MPEG-playing music and media player-type devices such as IPods with internal flash or hard drive based memory that supports a data storage function. • PDAs, cell phone handsets, and smart phones with internal flash or hard drive based memory that support a data storage function. • Digital cameras with internal or external memory support. • Removable memory based media, such as DVDs, CDs, and floppy disks. • Any hardware that provides connectivity to USB devices through means such as wireless (Wi-Fi, WiMAX, IrDA, Bluetooth, among others) or wired network access. This policy applies to any hardware and related software that could be used to access corporate resources, even if said equipment is not corporately sanctioned, owned, or supplied. The overriding goal of this policy is to protect the...
Words: 1274 - Pages: 6
...A hard disk drive (HDD; also hard drive, hard disk, or disk drive)[note 2] is a data storage device used for storing and retrieving digital information from non-volatile memory (retaining its data even when powered off) in a random-access manner (data can be retrieved in any order rather than just sequentially). An HDD consists of one or more rigid ("hard") rapidly rotating discs (platters) coated with magnetic material, with magnetic heads arranged on a moving actuator arm to read and write data to the surfaces. An optical disk drive uses laser technology to write data to and read data from an optical disk. The optical disk drives use removable media. The following are the different types of optical disk drives: * Library-resident (in 3995 libraries) * Operator-accessible (3995) * Multifunction (library resident or operator-accessible in all 3995 models except 3995-131 and 3995-132) A USB flash drive is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Disk partitioning is the act of dividing a hard disk drive into multiple logical storage units referred to as partitions, to treat one physical disk drive as if it were multiple disks. Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive Backup and Restore[1]...
Words: 359 - Pages: 2
...Working with Image Files (IMG and ISO) 2015-02-03 Version 3.0 TABLE OF CONTENTS ISO and IMG Files ......................................................................................................................................... 2 What is an IMG or ISO File? ............................................................................................................... 2 32-Bit vs 64-Bit .................................................................................................................................... 2 Bootable Installation Packages ..................................................................................................................... 3 Package? Image? Disk/Media? .......................................................................................................... 3 Bootable Installation Package ............................................................................................................ 3 What do I do with My Installation Package? ....................................................................................... 4 Preparing Physical Media from a Bootable Installation Image ..................................................................... 5 Requirements ...................................................................................................................................... 5 Creating Bootable DVD Media ................................................................................
Words: 1800 - Pages: 8
...getting used to the new version, things start to clear up, but it does take time. This is no to say that the new versions are bad, but sometimes there really doesn’t need to be any changes. If it’s not broke, don’t fix it. Also, another issue I sometimes notice which may lead to problems is that now there are so many options. I understand sometimes there is a need to have graphic designs or special fonts, but wouldn’t you want to use a special program for that? I feel sometimes less is best and it keeps things simple and less room for error. Interesting fact about formatting, in the world of Information Technology, the term “formatting” can have several different meanings. • Disk formatting “the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive” (Disk formatting, 2013) • File formatting “tells the computer how to display, print, and process, and save the data” (File format, 2013). • Page formatting “describe the page layout or style of text in a word processing document. When you format the layout of a page, you can modify the page...
Words: 418 - Pages: 2
...Working with Image Files (IMG and ISO) 2015-02-03 Version 3.0 TABLE OF CONTENTS ISO and IMG Files ......................................................................................................................................... 2 What is an IMG or ISO File? ............................................................................................................... 2 32-Bit vs 64-Bit .................................................................................................................................... 2 Bootable Installation Packages ..................................................................................................................... 3 Package? Image? Disk/Media? .......................................................................................................... 3 Bootable Installation Package ............................................................................................................ 3 What do I do with My Installation Package? ....................................................................................... 4 Preparing Physical Media from a Bootable Installation Image ..................................................................... 5 Requirements ...................................................................................................................................... 5 Creating Bootable DVD Media ................................................................................
Words: 1800 - Pages: 8
...WHAT IS REMOTE NETWORK ACCESS TECHNOLOGY? or REMOTE ACCESS SERVICE ( RAS ) Remote network access technology allows access to a computer or a network from a remote distance. Employees at branch or satellite offices or telecommuters, and travelling staff members may need access to the company or agency’s network and are able to do so via remote access. Users working from home get access through an Internet service provider (ISP) or Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines. These days almost every company offers some type of remote access to accommodate employees working outside the office and others like business partners, vendors, or external technical support. Remote Access Service (RAS) allows remote clients to dial-in and connect to network as if they were locally connected in the office. VPN REMOTE ACCESS TECHNOLOGY VPN (Virtual Private Network) & Tunneling A Virtual Private Network (VPN) is a private connection over a public network such as the Internet. VPNs can save a company a lot of money because it use Internet connection rather than expensive long-distance point-to-point connections such as dial-up, ISDN, and leased lines, to allow remote networks and remote employees to connect to the corporate network. A site-to-site or LAN-to-LAN VPN as shown below is typically used for connecting branch offices of a single organization or for creating an extranet for business partners. The second main type...
Words: 1041 - Pages: 5
...use of removable media devices that transfer information by all users who have access to any means of data within the company. Objective This form is an official Richman Investments document pertaining to the establishment of principles and working practices that are to be abided by all users in order for data to be safely stored and transferred by means of a removable device. The importance of controlling removable media and the objective of this policy is to: 1. Prohibit any unauthorized disclosure of information as may be necessary to company policy. 2. Maintain data integrity. 3. Build network integrity by instilling confidence and trust with data on the network. 4. Keep high standards of security with the use of protected and restricted data. 5. Avoid malicious network intusions. 6. Prevent unintended or malicious harm on the Richman Investments data network. Applicable Parties This policy applies to all Richman Investment employees, members, committees, business partners, third party IT services, guests, or anyone who is approved access to the data network, IT hardware resources, or any equipment with means of access to files within Richman Investments. Removable Devices Defined 1. USB Memory sticks (flash drive) 2. USB or external hard drive 3. Media Card Readers 4. Embedded microchips (smart cards, mobile phone SIM cards) 5. MP3 or Ipod players 6. Cameras 7. Any media device with storage space with means of transfer...
Words: 1105 - Pages: 5
...Chain of Custody in Criminal Proceedings Introduction The production of physical evidence is essential for the conduct of criminal trials. Chain of custody procedures represent the application of a legal principle intended to ensure the evidence produced at trial is the same evidence seized by law enforcement authorities related to the crime, and has not been confused with evidence related to other crimes. In addition, chain of custody procedures are necessary to ensure the evidence has not been altered or tampered with between the time of seizure and the time the evidence is produced in court. Both documentation about the way the evidence was protected as well as the legal adequacy of the procedures used by law enforcement authorities is necessary to establish chain of custody. The failure to establish a chain of custody may result in the exclusion of the evidence at trial, although in some situations involving a broken chain of custody the evidence may be admissible if it can be precisely identified by a unique characteristic such as a serial number. While the documentary requirements to establish chain of custody are relatively similar for the evidence for most crimes, there is variation in the procedures used to maintain a chain of custody depending on the type of crime and the nature of the evidence. The burden of establishing the authenticity of the evidence with chain of custody generally rests with the party seeking admission of the evidence at trial, although there...
Words: 4859 - Pages: 20
...Guidelines There are three questions in this assignment. Question 1 and Question 2 are listening tasks based on recordings which are contained on your TMA CD. Question 3 is a speaking task. The Listening and Speaking parts of the assignment each carry 50% of the mark for TMA 1. Before you complete this assignment, you are advised to review both the listening and the speaking skills covered in Units 1 and 2. You must submit your responses to all three questions by post to your tutor’s mailing address. Please write or type your responses to Questions 1 and 2 on A4-size paper and record your spoken answers to Question 3 on a CD or USB drive. Part I: Listening (50 marks) Listen to the two recordings on your TMA CD for TMA 1. Both recordings are talks. In the first talk, the speaker describes an older colonial part of Guangzhou, and how attitudes towards colonial heritage in China are changing. The second recording is a talk about the new phenomenon called the ‘smart phone walk.’ Listen to the recordings carefully before you attempt the questions/tasks below. Respond to the questions/tasks using complete sentences written in your own words. Marks will be deducted for poor grammar, vocabulary and spelling. Try to avoid simply transcribing the content of the recording, but instead summarize and paraphrase what you hear. Your responses should be based on the information you hear in the recordings, not on your existing knowledge or on information gained from other sources...
Words: 832 - Pages: 4