SlideShare a Scribd company logo
1 of 57
Name Photo ID Batch Section Semester Year
Julfeker Hyder 2172011015 43 A Spring 2018
Smrity Mojumdar 2171011055 42 A Spring 2018
Mito Akter 2172011010 43 A Spring 2018
Palash Kumar
Sharma
2172011045 43 A Spring 2018
 Introduction
 History
 Structure of RAM
 How to RAM install in motherboard
 How RAM run to a program
 Types of Ram
 Difference
 Other types of RAM
 Technologies of RAM
 Capacity to store
 Manufacturing Companies
 Advantage & Disadvantage
 Conclusion
Random access memory (RAM) is the best
known as computer memory.
It is volatile memory which store current data
& instruction for processing.
RAM is consider as volatile memory, which
means that the stored information is lost when
there is no power.
Whenever you open a program, It gets loaded
from the hard drive into RAM.
RAM(Random Access
Memory) was invented by
Robert Heath Dennard.
At IBM Tomas J Watson
research center in 1968.
RAM
SRAM(Static
Random access
memory)
DRAM(Dynamic
Random Access
Memory)
SRAM(Static Random Access Memory)
SRAM Holds data in a static from, as long as memory has the
power .
Each bit is stored on four transistor that forms two cross
couple inverter .
DRAM(Dynamic Random Access Memory)
DRAM is called dynamic because it must constantly be
refreshed and lose the data vary short time.
DRAM stores each bit of data in a separate capacitor within
integrated circuit.
From Beginning :
256MB
512MB
1024MB(1GB)
2048MB(2GB)
4096MB(4GB)
8192MB(8GB)
oNote: Here every time the size of RAM increase by
multiplying twice.
ASUS
Buffalo Technology
Century
CEON
CHAINTECH
ELIXIR
HP
Program will load much faster.
Power Efficient, that uses much less power than disk
drive
Volatile: A power outage will cause irrecoverable data loss.
Space-limited: Cost per bit is high.
Future update version of RAM :
External RAM Enhance Computer Speed
In Computing interface development, In the abbreviation for
the fifth generation of Double Data Rate Synchronous
Dynamic Random Access Memory.
DDR is planned to reduce power consumption once again,
While doubling bandwidth and capacity relative to DDR4
SDRAM.
Type: Synchronous Dynamic Random Access Memory(SDRAM)
Release date: 2019(Estimated)
Presentation about Computer RAM
Presentation about Computer RAM

More Related Content

What's hot

What's hot (20)

Presentation
PresentationPresentation
Presentation
 
Ram & rom
Ram & romRam & rom
Ram & rom
 
Part 5 Computer memory | Primary Memory | Secondary Memory
Part 5 Computer memory | Primary Memory | Secondary MemoryPart 5 Computer memory | Primary Memory | Secondary Memory
Part 5 Computer memory | Primary Memory | Secondary Memory
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
EPROM, PROM & ROM
EPROM, PROM & ROMEPROM, PROM & ROM
EPROM, PROM & ROM
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Memory
MemoryMemory
Memory
 
Internal storage of a computer system
Internal storage of a computer systemInternal storage of a computer system
Internal storage of a computer system
 
Types of memory 10 to11
Types of memory 10 to11Types of memory 10 to11
Types of memory 10 to11
 
RAM and ROM Memory Overview
RAM and ROM Memory OverviewRAM and ROM Memory Overview
RAM and ROM Memory Overview
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Primary memory
Primary memoryPrimary memory
Primary memory
 
Lincoln khan computer presentation
Lincoln khan computer presentationLincoln khan computer presentation
Lincoln khan computer presentation
 
Ch05 coa9e
Ch05 coa9eCh05 coa9e
Ch05 coa9e
 
Basics Of Semiconductor Memories
Basics Of Semiconductor MemoriesBasics Of Semiconductor Memories
Basics Of Semiconductor Memories
 
Types of Computer Memories
Types of Computer MemoriesTypes of Computer Memories
Types of Computer Memories
 
Types of rom
Types of romTypes of rom
Types of rom
 
Csc1401 lecture06 - internal memory
Csc1401   lecture06 - internal memoryCsc1401   lecture06 - internal memory
Csc1401 lecture06 - internal memory
 
Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)
 
MEMORY AND STROGE
MEMORY AND STROGEMEMORY AND STROGE
MEMORY AND STROGE
 

Similar to Presentation about Computer RAM

Similar to Presentation about Computer RAM (20)

Random access memory
Random access memoryRandom access memory
Random access memory
 
RAM slide
RAM slideRAM slide
RAM slide
 
Random Access Memory (RAM)
Random Access Memory (RAM)Random Access Memory (RAM)
Random Access Memory (RAM)
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
RAM :A primary Memory
RAM :A primary MemoryRAM :A primary Memory
RAM :A primary Memory
 
Volatile memory
Volatile memoryVolatile memory
Volatile memory
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Random Access Memory ppt
 
Topic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxTopic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptx
 
RAM & ROM
RAM & ROMRAM & ROM
RAM & ROM
 
06 - Memory.ppt
06 - Memory.ppt06 - Memory.ppt
06 - Memory.ppt
 
Memory - RAM and its types
Memory - RAM and its typesMemory - RAM and its types
Memory - RAM and its types
 
memory.pptx
memory.pptxmemory.pptx
memory.pptx
 
Cse
CseCse
Cse
 
Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02
 
Ram ppt
Ram pptRam ppt
Ram ppt
 
Primary memory (main memory)
Primary memory (main memory)Primary memory (main memory)
Primary memory (main memory)
 
Static and dynamic memories
Static and dynamic memoriesStatic and dynamic memories
Static and dynamic memories
 
Dram and its types
Dram and its typesDram and its types
Dram and its types
 
Introduction of ram ddr3
Introduction of ram ddr3Introduction of ram ddr3
Introduction of ram ddr3
 
Introduction of ram ddr3
Introduction of ram ddr3Introduction of ram ddr3
Introduction of ram ddr3
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Presentation about Computer RAM

  • 1.
  • 2. Name Photo ID Batch Section Semester Year Julfeker Hyder 2172011015 43 A Spring 2018 Smrity Mojumdar 2171011055 42 A Spring 2018 Mito Akter 2172011010 43 A Spring 2018 Palash Kumar Sharma 2172011045 43 A Spring 2018
  • 3.
  • 4.
  • 5.  Introduction  History  Structure of RAM  How to RAM install in motherboard  How RAM run to a program  Types of Ram  Difference  Other types of RAM  Technologies of RAM  Capacity to store  Manufacturing Companies  Advantage & Disadvantage  Conclusion
  • 6. Random access memory (RAM) is the best known as computer memory. It is volatile memory which store current data & instruction for processing. RAM is consider as volatile memory, which means that the stored information is lost when there is no power. Whenever you open a program, It gets loaded from the hard drive into RAM.
  • 7. RAM(Random Access Memory) was invented by Robert Heath Dennard. At IBM Tomas J Watson research center in 1968.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 33. SRAM(Static Random Access Memory) SRAM Holds data in a static from, as long as memory has the power . Each bit is stored on four transistor that forms two cross couple inverter . DRAM(Dynamic Random Access Memory) DRAM is called dynamic because it must constantly be refreshed and lose the data vary short time. DRAM stores each bit of data in a separate capacitor within integrated circuit.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 54. Program will load much faster. Power Efficient, that uses much less power than disk drive Volatile: A power outage will cause irrecoverable data loss. Space-limited: Cost per bit is high.
  • 55. Future update version of RAM : External RAM Enhance Computer Speed In Computing interface development, In the abbreviation for the fifth generation of Double Data Rate Synchronous Dynamic Random Access Memory. DDR is planned to reduce power consumption once again, While doubling bandwidth and capacity relative to DDR4 SDRAM. Type: Synchronous Dynamic Random Access Memory(SDRAM) Release date: 2019(Estimated)

Editor's Notes

  1. .