Describe each of the following storage technologies: optical, magnetic, and solid-state. How does each work? Give an example of where it is used.
What will be an ideal response?
Optical storage stores data as microscopic light and dark spots on the disk surface. Low-power laser light is used to read the data stored on an optical disc. Patterns of light and dark are interpreted as the 1s and 0s that represent data. CDs, DVDs, and BDs use optical storage.
Magnetic storage stores data by magnetizing microscopic particles on the disk or tape surface. The particles retain their magnetic orientation until that orientation is changed. Patterns of magnetized particles are interpreted as the 0s and 1s that represent data. Magnetic storage is used by hard disks and tape.
Solid-state storage stores data in a durable, erasable, low-power chip. It provides faster data access than the other two methods because it has no moving parts. It requires little power, so is good for battery-operated equipment. It is durable and portable. Solid-state storage is used by some hard drives, storage cards, flash drives, and memory sticks.
You might also like to view...
A _____ network typically connects personal computers within a very limited geographical area.
A. local area B. wide area C. virtual D. private
If you put ____________________ and secondary colors together, your slide will make a very bold and vivid statement.
Fill in the blank(s) with the appropriate word(s).
Which of the following is an example of a multilayer authentication?
A. A fingerprint scan and a smart card B. A retina scan and a password C. A retina scan and a fingerprint scan D. A password and a smart card
Match each item with a statement below:
A. freedom from danger B. allows a software program to run only with a matching external piece of information called a license C. involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult D. software attack that prohibits an opponent from using a program or an entire system E. the most widely recognized MLS model F. examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller G. the standard for ranking product capabilities and trustworthiness H. the process of discovering all necessary requirements I. describe the different approaches that can be used to attack a system