SlideShare a Scribd company logo
1 of 13
CATEGORY OF MEMORIES
By Nouman Baloch
Types of memory in computer
 Memory is divided into two big clusters.
 1) Primary Memory
 2) Secondary Memory
Primary Memory
 Primary Memory (also called main memory),
is used for immediate access of data by the
processor.
 Primary memory further divided into two
types.
 1) RAM(Random Access Memory)
 2) ROM(Read Only Memory)
RAM (Random Access Memory)
 RAM is a memory within the computer
responsible for storing data temporary . CPU
can access data directly from RAM .It is
volatile in nature, which means that data will
be erased once supply to the storage device is
turned off.
ROM (Read Only Memory)
 Unlike RAM, ROM is a permanent form of
storage. ROM stays active regardless of
whether power supply to it is turned on or off.
Secondary Memory
 Secondary memory is available on mass
storage devices for permanent data storage.
Data stored on a secondary device is retained
even when it is not supplied any power. Some
examples of secondary memories are given in
next slide.
Examples
 1) MagneticTape 2) Floppy Disk
 3) Hard Disk 4) USB Pen Drives
Magmatic Tape
 Magnetic tape data storage is a system for
storing digital information on magnetic
tape using digital recording
Floppy Disk
 What became the most common format, the
double-sided, high-density (HD) 1.44 MB disk
drive, shipped in 1986.The first Macintosh
computers use single-sided 31⁄2-inch floppy
disks, but with 400 KB formatted capacity
Hard Disk
 A hard disk drive (HDD), hard
disk, hard drive, or fixed disk, is an
electromechanical data storage device that
uses magnetic storage to store and retrieve
digital information using one or more rigid
rapidly rotating disks (platters) coated with
magnetic material
SSD(Solid State Drive)
 SSDs are sometimes referred to as flash
drives or solid-state disks. Unlike a hard disk
drive (HDD), an SSD has no moving parts to
break or spin up or down.
USB(Universal Serial Bus)
 A USB flash drive is a device used for data
storage that includes a flash memory and an
integrated Universal Serial Bus (USB)
interface. Most USB flash drives are
removable and rewritable.
Any
Question
please ask?

More Related Content

What's hot

What's hot (20)

Computer memory
Computer memoryComputer memory
Computer memory
 
Computer storage & type of storage.
Computer storage & type of storage.Computer storage & type of storage.
Computer storage & type of storage.
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
 
Ram and its types
Ram and its typesRam and its types
Ram and its types
 
Hard disk
Hard diskHard disk
Hard disk
 
Ram & rom memories
Ram & rom memoriesRam & rom memories
Ram & rom memories
 
Computer storage
Computer storageComputer storage
Computer storage
 
Types of RAM
Types of RAMTypes of RAM
Types of RAM
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Presentation on computer data storage
Presentation on computer data storage Presentation on computer data storage
Presentation on computer data storage
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their Types
 
Auxiliary memory
Auxiliary memoryAuxiliary memory
Auxiliary memory
 
Computer memory in general
Computer memory in generalComputer memory in general
Computer memory in general
 
Types of personal computers
Types of personal computersTypes of personal computers
Types of personal computers
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
computer memory ,., .
computer memory ,., .computer memory ,., .
computer memory ,., .
 
Memory module
Memory moduleMemory module
Memory module
 

Similar to Types of Computer Memory Explained

Similar to Types of Computer Memory Explained (20)

Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
 
Storage hardware
Storage hardwareStorage hardware
Storage hardware
 
storage media
storage mediastorage media
storage media
 
Classification of memory
Classification of memoryClassification of memory
Classification of memory
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
 
overview of physical storage media
overview of physical storage mediaoverview of physical storage media
overview of physical storage media
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
 
Memory / Storage Devices
Memory / Storage DevicesMemory / Storage Devices
Memory / Storage Devices
 
What is memory
What is memoryWhat is memory
What is memory
 
Memory Devices
Memory DevicesMemory Devices
Memory Devices
 
presentation on memory units.
presentation on memory units.presentation on memory units.
presentation on memory units.
 
Computer memory
Computer memoryComputer memory
Computer memory
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
 
Memory Presentation
Memory PresentationMemory Presentation
Memory Presentation
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
Storage devices
Storage devicesStorage devices
Storage devices
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
 

More from Nouman Baloch

Cued Click Point Authentication
Cued Click Point AuthenticationCued Click Point Authentication
Cued Click Point AuthenticationNouman Baloch
 
4 Top Network Monitoring Tools
4 Top Network Monitoring Tools4 Top Network Monitoring Tools
4 Top Network Monitoring ToolsNouman Baloch
 
introduction of iptables in linux
introduction of iptables in linuxintroduction of iptables in linux
introduction of iptables in linuxNouman Baloch
 
Intro to Cloud Computing
Intro to Cloud ComputingIntro to Cloud Computing
Intro to Cloud ComputingNouman Baloch
 
Introduction to CSS Class - 1
Introduction to CSS Class - 1Introduction to CSS Class - 1
Introduction to CSS Class - 1Nouman Baloch
 
Dining philosopher problem
Dining philosopher problemDining philosopher problem
Dining philosopher problemNouman Baloch
 

More from Nouman Baloch (7)

Main
MainMain
Main
 
Cued Click Point Authentication
Cued Click Point AuthenticationCued Click Point Authentication
Cued Click Point Authentication
 
4 Top Network Monitoring Tools
4 Top Network Monitoring Tools4 Top Network Monitoring Tools
4 Top Network Monitoring Tools
 
introduction of iptables in linux
introduction of iptables in linuxintroduction of iptables in linux
introduction of iptables in linux
 
Intro to Cloud Computing
Intro to Cloud ComputingIntro to Cloud Computing
Intro to Cloud Computing
 
Introduction to CSS Class - 1
Introduction to CSS Class - 1Introduction to CSS Class - 1
Introduction to CSS Class - 1
 
Dining philosopher problem
Dining philosopher problemDining philosopher problem
Dining philosopher problem
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Types of Computer Memory Explained

  • 1. CATEGORY OF MEMORIES By Nouman Baloch
  • 2. Types of memory in computer  Memory is divided into two big clusters.  1) Primary Memory  2) Secondary Memory
  • 3. Primary Memory  Primary Memory (also called main memory), is used for immediate access of data by the processor.  Primary memory further divided into two types.  1) RAM(Random Access Memory)  2) ROM(Read Only Memory)
  • 4. RAM (Random Access Memory)  RAM is a memory within the computer responsible for storing data temporary . CPU can access data directly from RAM .It is volatile in nature, which means that data will be erased once supply to the storage device is turned off.
  • 5. ROM (Read Only Memory)  Unlike RAM, ROM is a permanent form of storage. ROM stays active regardless of whether power supply to it is turned on or off.
  • 6. Secondary Memory  Secondary memory is available on mass storage devices for permanent data storage. Data stored on a secondary device is retained even when it is not supplied any power. Some examples of secondary memories are given in next slide.
  • 7. Examples  1) MagneticTape 2) Floppy Disk  3) Hard Disk 4) USB Pen Drives
  • 8. Magmatic Tape  Magnetic tape data storage is a system for storing digital information on magnetic tape using digital recording
  • 9. Floppy Disk  What became the most common format, the double-sided, high-density (HD) 1.44 MB disk drive, shipped in 1986.The first Macintosh computers use single-sided 31⁄2-inch floppy disks, but with 400 KB formatted capacity
  • 10. Hard Disk  A hard disk drive (HDD), hard disk, hard drive, or fixed disk, is an electromechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material
  • 11. SSD(Solid State Drive)  SSDs are sometimes referred to as flash drives or solid-state disks. Unlike a hard disk drive (HDD), an SSD has no moving parts to break or spin up or down.
  • 12. USB(Universal Serial Bus)  A USB flash drive is a device used for data storage that includes a flash memory and an integrated Universal Serial Bus (USB) interface. Most USB flash drives are removable and rewritable.