Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 38
Page 20
... tape storage and disk storage . Tape storage is based on the magnetic recording of bit patterns on long strips of plastic tape that can be wound on a reel for storage . The major drawback to this system is that all reading and writing ...
... tape storage and disk storage . Tape storage is based on the magnetic recording of bit patterns on long strips of plastic tape that can be wound on a reel for storage . The major drawback to this system is that all reading and writing ...
Page 31
An Overview J. Glenn Brookshear. Figure 1-6 A tape storage mechanism Tape reel Take - Up reel Tape Read / Write head Tape motion Tape is in turn wound on a reel for storage . To access the data , this tape is mounted in a device called a ...
An Overview J. Glenn Brookshear. Figure 1-6 A tape storage mechanism Tape reel Take - Up reel Tape Read / Write head Tape motion Tape is in turn wound on a reel for storage . To access the data , this tape is mounted in a device called a ...
Page 32
... tape Inter - Record gaps ta Data Tape Data Data blocks no larger than 800 characters each ( a significant amount of data ) are written on a tape that holds 1600 characters per inch ( a typical value for the larger tape units ) , then ...
... tape Inter - Record gaps ta Data Tape Data Data blocks no larger than 800 characters each ( a significant amount of data ) are written on a tape that holds 1600 characters per inch ( a typical value for the larger tape units ) , then ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement