by Dinesh Thakur Category: Memory

Register are used to quickly accept, store, and transfer data and instructions that are being used immediately by the CPU, there are various types of Registers those are used for various purpose. Among of the some Mostly used Registers named as AC or Accumulator, Data Register or DR, the AR or Address Register, program counter (PC), Memory Data Register (MDR) ,Index register,Memory Buffer Register.

 
by Dinesh Thakur Category: Memory

When a Process is executed by the CPU and when a user Request for another Process then this will create disturbance for the Running Process. This is also called as the Interrupt.

 
by Dinesh Thakur Category: Memory

Definition of parity memory: Some Random Access Memory (RAM) chips have built-in error-checking functions that use a process called parity. Chips that use parity have an extra bit for every eight bits of data. In the parity process, as the eight bits receive binary data (data represented by 1s and 0s), the chip adds all the 1s, and if that total is odd, the extra bit is set to 1.The most common data error-checking and validation technique is the Vertical Redundancy Check (VRC) often called a parity check.

 
by Dinesh Thakur Category: Memory

A device for storing digital information that is fabricated by using integrated circuit technology. Also known as integrated-circuit memory; large-scale integrated memory; memory chip; semiconductor storage; transistor memory.



 
by Dinesh Thakur Category: Memory

Primary Storage, also known as main storage or memory, is the main area in a computer in which data is stored for quick access by the computer's processor. Information must be transferred to primary storage. On today's smaller computers, especially personal computers and workstations, the term random access memory (RAM) - or just memory - is used instead of primary, main storage, core memory, or immediate access storage, internal storage, and the hard disk, diskette, CD, and DVD collectively describe secondary storage or auxiliary storage.



 
by Dinesh Thakur Category: Memory

In computing, Sequential Access Memory (SAM) is a class of data storage devices that read their data in sequence. This is in contrast to random access memory (RAM) where data can be accessed in any order. Sequential access devices are usually a form of magnetic memory.

While sequential access memory is read in sequence, accesses can still be made to arbitrary locations by "seeking" to the requested location. This operation, however, is often relatively inefficient (see seek time, rotational latency).

Magnetic sequential access memory is typically used for secondary storage in general-purpose computers due to their higher density at lower cost compared to RAM, as well as resistance to wear and non-volatility. Examples of SAM devices still in use include hard disks, CD-ROMs and magnetic tapes. Historically, drum memory has also been used.




 
by Dinesh Thakur Category: Memory

Bubble memory is a type of non-volatile computer memory that uses a thin film of a magnetic material to hold small magnetized areas, known as bubbles or domains, each storing one bit of data. Andrew Bobeck invented the Bubble Memory in 1970. His development of the magnetic core memory and the development of the twistor memory put him in a good position for the development of Bubble Memory.



 
by Dinesh Thakur Category: Memory

Optical Mark Recognition (OMR) is the technology of electronically extracting intended data from marked fields, such as checkboxes and fill-in fields, on printed forms. It is generally distinguished from OCR by the fact that a recognition engine is not required. This requires the image to have high contrast and an easily-recognizable or irrelevant shape.



 
by Dinesh Thakur Category: Memory

Magnetic Ink Character Recognition(MICR) is a technique that enables special characters printed in magnetic ink to be read and input rapidly to a computer. When a document that contains this ink needs to be read, it passes through a machine, which magnetizes the ink and then translates the magnetic information into characters.



 
by Dinesh Thakur Category: Memory

OCR stands for optical character recognition, a wonderful and marvellous technology. It enables you to convert previously printed text material into information your computer can understand, without having to retype it. Have you ever had a story or an article or a magazine clipping that you wanted to have in your computer, but the thought of retyping the entire thing was overwhelming? Or just boring? That's what OCR is for.



 
by Dinesh Thakur Category: Memory

A computer device, such as a CD-ROM drive or printer, which is not part of the essential computer, i.e., the memory and microprocessor. Peripheral devices can be external -- such as a mouse, keyboard, printer, monitor, external Zip drive or scanner -- or internal, such as a CD-ROM drive, CD-R drive or internal modem. Internal peripheral devices are often referred to as integrated peripherals. Linkage between the CPU and the users is provided by Peripheral devices.



 
by Dinesh Thakur Category: Memory

A printer is an output device that prints characters, symbols, and perhaps graphics on paper. The printed output is generally referred to as hardcopy because it is in relatively permanent form. Softcopy refers to temporary images such as those displayed on a monitor. Printers are categorized according to whether or not the image produced is formed by physical contact of the print mechanism with the paper. Impact printers have contact; nonimpact printers do not.



 
by Dinesh Thakur Category: Memory

Line Printers :- Line Printer can Print One Line at a Time. The line printer is a form of high speed impact printer. They can Print 300 to 3000 Lines per Minute. So that they are very fast. Large Computer system typically use Line Printer. The Line Printers are of two Types.



 
by Dinesh Thakur Category: Memory

Hard Disk Drive Definition: It is also called HDD,"disk drive," (hard drive) or harddisk is a non-volatile. The hard disk drive is the primary storage unit of the computer. This is where your data, programs and the Windows system that is used to make your computer are physically saved in a digital form (string composed of 0s and 1s). There harddisk capacity is expressed in gigabytes (GB). More hard disk drive will have a large capacity, the more you can install programs or store documents in your computer.



 
by Dinesh Thakur Category: Memory

As we know that the Main Memory Stores the data in a Temporary Manner means all the data will be loss when the Power switched off. And all the data will be loss when the power goes switched off.

So that we uses the Secondary Storage devices those are used for Storing the data in a Permanent Manner means all the Data will remain Stored whether the Power is Switched on or Switched off means the Power Will never effect on the System. For storing the data in a Permanent Manner we uses the Magnetic Storage Devices. There are also Some Advantages of Secondary Storage Devices.

 
by Dinesh Thakur Category: Memory

DDRAM: - Short for Double Data Rate-Synchronous DRAM, a type of SDRAM that supports data transfers on both edges of each clock cycle (the rising and falling edges), effectively doubling the memory chip's data throughput. DDR-SDRAM also consumes less power, which makes it well suited to notebook computers. DDR-SDRAM is also called SDRAM II And DDRAM.

 
by Dinesh Thakur Category: Memory

There are two types of relational integrity rules

Entity Integrity: - No attribute participating in the primary key of a base relation allowed containing any nulls. Primary key performs the unique identification function in a relational model. Thus a null primary key value within a base relation would be like saying that there was some entity that had no known identity. An entity that cannot be identified is a contradiction in terms, hence the name entity integrity.

 
by Dinesh Thakur Category: Operating System

Definition: A Scheduling Algorithm is the algorithm which tells us how much CPU time we can allocate to the processes.
These scheduling algorithms are either preemptive or non-preemptive.
Preemptive Scheduling Algorithms are those which are based on the priority of the processes. By preference, when a high priority process enters, it preempts a low priority process in between and executes the high priority process first.
Non-preemptive Scheduling Algorithms are those who can’t be preempted in between, i.e. we can not take control of CPU in between until the current process completes its execution.

 
by Dinesh Thakur Category: Operating System

Definition: System Software can be designed as the software in such a way so that it can control and work with computer hardware. It acts as an interface between the device and the end user.



 
by Dinesh Thakur Category: Operating System

Definition: Priority Scheduling is a scheduling process which is based on priority. In priority scheduling, the scheduler himself chooses the task priority, and the process which has the highest priority is processed first as compared to other processes.

Example: Shortest Job First (SJF) scheduling

 

Page 5 of 17



About Dinesh Thakur

Dinesh ThakurDinesh Thakur holds an B.SC (Computer Science), MCSE, MCDBA, CCNA, CCNP, A+, SCJP certifications. Dinesh authors the hugely popular blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps. For any type of query or something that you think is missing, please feel free to Contact us.