SlideShare a Scribd company logo
1 of 17
Introduction to Computer
Lecture # 9
Course Instructor : Sehrish Rafiq
Govt. Girls Degree College Maneri Swabi
Higher Education Department KP
Lecture Overview
 Cache memory
 Level-1
 Level-2
 Level-3
 RAM
 SRAM
 DRAM
 ROM
 PROM
 EPROM
 EEPROM
Cache Memory
 Cache memory is a very high speed memory that is placed
between the CPU and main memory, to operate at the speed
of the CPU.
 CPU is the fastest component of computer but the speed of
fetching instruction from memory is normally slower than the
speed of CPU.
 As a result, the speed of CPU is also affected because for
doing its work first it has to fetch instructions from memory.
 To bridge this speed gap, Cache memory is placed between
CPU and main memory.
 The speed of cache memory is faster than main memory but is
slower than registers.
Cache Memory
Cache Memory
 Cache is cheaper than registers which justifies their use.
 Cache is used to store that data and instructions which are
frequently demanded by the running program, so that the number
of main memory accesses can be reduced.
 There are three types of cache memory.
 Level-1 cache
 Level-2 cache
 Level-3 cache
Level-1 Cache
 Level-1 cache is built in to the actual processor core.
 It is a piece of high speed memory which operates at the
same speed as CPU.
 It is directly accessible by the processor.
 It holds data that the processor needs to execute instructions.
 It is very expensive and small in size.
 Its typical sizes are 8,16,32,64 or 128 KB.
Level-2 Cache
 Level-2 cache pulls information from RAM which is then
accessed by the Level-1 Cache.
 Level-2 Cache memory is faster and smaller in size than RAM
but is slower and greater in size than Level-1 cache.
 It is less expensive than Level-1 Cache.
 Its size varies between 64 KB to 16 MB.
 The purpose of Level-2 cache is to constantly read in slightly
larger quantities of data from RAM to be available to Level-1
cache.
 Level-2 cache is mostly built in to the processor chip but in some
cases it lies on the motherboard.
Level-3 Cache
 Level-3 cache is specialized memory that works hand in hand
with Level-1 and Level-2 cache to improve system performance.
 Level-3 cache is the biggest cache memory.
 It anticipates data requests so that processing instructions are
provided without delay.
 Level-3 cache is faster than RAM but slower than Level-1 and
Level-2 cache.
 CPU first looks for data and instructions in Level-1 cache then it
checks Level-2 and Level-3 cache respectively.
 Level-3 cache lies on motherboard.
RAM
 RAM stands for Random Access Memory is the most common
type of memory found in computers.
 It is also known as main memory or primary memory.
 Instructions and data cannot be used by the processor until they
are brought in to RAM.
 It is a R/W memory and allow the computer to store and access
data and instructions randomly.
 RAM is volatile in nature which means that if the computer is
turned off or a power failure occurs all the data contained in
RAM is lost.
Continued…
 If the computer is turned off, all data contained in RAM is lost.
 There are two types of RAM.
 Static RAM(SRAM)
 Dynamic RAM(DRAM)
Static RAM(SRAM)
 SRAM is a type of semi-conductor memory.
 The word static indicates that it does not need to be
periodically refreshed to retain its data.
 SRAM is more expensive but faster and less power hungry
than DRAM.
 SRAM is mainly used to make CPU cache.
 Because of its complex structure, it is expensive and cannot
be used for high capacity storage.
Dynamic RAM
 DRAM is also a semi-conductor memory.
 DRAM needs to be periodically refreshed to retain its contents.
 It stores each bit of data in a separate capacitor within an
integrated circuit.
 The capacitor can be either charged or discharged.
 In personal computers DRAM is used as main memory.
 Because of their simple structure they allow high storage and
are low cost.
ROM
 ROM stands for Read Only Memory.
 ROM is a non-volatile memory which means that when power
goes off it does not lose its information.
 ROM is used for permanent storage of information.
 It possesses random access property like RAM.
 The contents of ROM are manufacturer supplied and cannot
be changed by users/programmers.
 There are three types of ROM.
 PROM
 EPROM
 EEPROM
PROM
 PROM stands for Programmable Read Only Memory.
 It is a type of ROM which can be programmed once and then can
never be changed.
 PROM is manufactured blank and then it is programmed just
once.
 The process is irreversible.
 The data is fed in to it using PROM programs.
EPROM
 EPROM stands for Erasable Programmable Read Only Memory.
 EPROM are non-volatile, they do not lose their content when
power supply is cut off.
 The content of EPROM chips can be erased using ultra-violet
light.
 They can be reprogrammed and reused many times.
EEPROM
 EEPROM stands for Electrically Erasable Programmable Read
Only Memory.
 EEPROM chips are also non-volatile.
 The content of these chips can also be erased but using
electricity instead of ultra violet light.
 EEPROM chips can also be reprogrammed many times.
Introduction to Computers Lecture # 9

More Related Content

What's hot

Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of compgaurav jain
 
Computer architecture
Computer architectureComputer architecture
Computer architectureZuhaib Zaroon
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Subhasis Dash
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann ArchitectureZahid Rajeel
 
Csc1401 lecture06 - internal memory
Csc1401   lecture06 - internal memoryCsc1401   lecture06 - internal memory
Csc1401 lecture06 - internal memoryIIUM
 
Von Neumann Architecture
Von Neumann Architecture   Von Neumann Architecture
Von Neumann Architecture Lor Ham
 
Hypothetical machine and instruction flow scenarios
Hypothetical machine and instruction flow scenariosHypothetical machine and instruction flow scenarios
Hypothetical machine and instruction flow scenariosMunaam Munawar
 
How CPU’s and Memory Work
How CPU’s and Memory WorkHow CPU’s and Memory Work
How CPU’s and Memory WorkJonathan Reid
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureProject Student
 
Internal storage of a computer system
Internal storage of a computer systemInternal storage of a computer system
Internal storage of a computer systemPalash Bhatt
 
Memory and storage (Jeric Bilita)
Memory and storage (Jeric Bilita)Memory and storage (Jeric Bilita)
Memory and storage (Jeric Bilita)YoKim RiZon
 
Unit IV Memory and I/O Organization
Unit IV Memory and I/O OrganizationUnit IV Memory and I/O Organization
Unit IV Memory and I/O OrganizationBalaji Vignesh
 
Processor Organization
Processor OrganizationProcessor Organization
Processor OrganizationDominik Salvet
 

What's hot (20)

Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of comp
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
CPU & RAM
CPU & RAMCPU & RAM
CPU & RAM
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1)
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann Architecture
 
memory hierarchy
memory hierarchymemory hierarchy
memory hierarchy
 
Memory devices copy
Memory devices   copyMemory devices   copy
Memory devices copy
 
Ch05 coa9e
Ch05 coa9eCh05 coa9e
Ch05 coa9e
 
Csc1401 lecture06 - internal memory
Csc1401   lecture06 - internal memoryCsc1401   lecture06 - internal memory
Csc1401 lecture06 - internal memory
 
Internal memory
Internal memoryInternal memory
Internal memory
 
Von Neumann Architecture
Von Neumann Architecture   Von Neumann Architecture
Von Neumann Architecture
 
Hypothetical machine and instruction flow scenarios
Hypothetical machine and instruction flow scenariosHypothetical machine and instruction flow scenarios
Hypothetical machine and instruction flow scenarios
 
Basic+machine+organization
Basic+machine+organizationBasic+machine+organization
Basic+machine+organization
 
How CPU’s and Memory Work
How CPU’s and Memory WorkHow CPU’s and Memory Work
How CPU’s and Memory Work
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
 
Internal storage of a computer system
Internal storage of a computer systemInternal storage of a computer system
Internal storage of a computer system
 
Memory and storage (Jeric Bilita)
Memory and storage (Jeric Bilita)Memory and storage (Jeric Bilita)
Memory and storage (Jeric Bilita)
 
Internal storage devices
Internal storage devicesInternal storage devices
Internal storage devices
 
Unit IV Memory and I/O Organization
Unit IV Memory and I/O OrganizationUnit IV Memory and I/O Organization
Unit IV Memory and I/O Organization
 
Processor Organization
Processor OrganizationProcessor Organization
Processor Organization
 

Similar to Introduction to Computers Lecture # 9

Similar to Introduction to Computers Lecture # 9 (20)

Main Memory RAM and ROM
Main Memory RAM and ROMMain Memory RAM and ROM
Main Memory RAM and ROM
 
Lincoln khan computer presentation
Lincoln khan computer presentationLincoln khan computer presentation
Lincoln khan computer presentation
 
Comp App Lect 3.pptx
Comp App Lect 3.pptxComp App Lect 3.pptx
Comp App Lect 3.pptx
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
 
Memory Devices.pptx
Memory Devices.pptxMemory Devices.pptx
Memory Devices.pptx
 
Memory devices
Memory devicesMemory devices
Memory devices
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Memory managment
Memory managmentMemory managment
Memory managment
 
Computer Memory and it types RAM ROM AND CACHE MEMORIES
Computer Memory and it types RAM ROM AND CACHE MEMORIESComputer Memory and it types RAM ROM AND CACHE MEMORIES
Computer Memory and it types RAM ROM AND CACHE MEMORIES
 
06 - Memory.ppt
06 - Memory.ppt06 - Memory.ppt
06 - Memory.ppt
 
Hafiz group
Hafiz groupHafiz group
Hafiz group
 
Computer Memory
 Computer Memory Computer Memory
Computer Memory
 
Memory
MemoryMemory
Memory
 
Basics Of Semiconductor Memories
Basics Of Semiconductor MemoriesBasics Of Semiconductor Memories
Basics Of Semiconductor Memories
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Random Access Memory ppt
 
It compter applications
It compter applicationsIt compter applications
It compter applications
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
 
RAM and ROM.pdf
RAM and ROM.pdfRAM and ROM.pdf
RAM and ROM.pdf
 
Computer ram
Computer ramComputer ram
Computer ram
 
2. the memory systems (module2)
2. the memory systems (module2)2. the memory systems (module2)
2. the memory systems (module2)
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Introduction to Computers Lecture # 9

  • 1. Introduction to Computer Lecture # 9 Course Instructor : Sehrish Rafiq Govt. Girls Degree College Maneri Swabi Higher Education Department KP
  • 2. Lecture Overview  Cache memory  Level-1  Level-2  Level-3  RAM  SRAM  DRAM  ROM  PROM  EPROM  EEPROM
  • 3. Cache Memory  Cache memory is a very high speed memory that is placed between the CPU and main memory, to operate at the speed of the CPU.  CPU is the fastest component of computer but the speed of fetching instruction from memory is normally slower than the speed of CPU.  As a result, the speed of CPU is also affected because for doing its work first it has to fetch instructions from memory.  To bridge this speed gap, Cache memory is placed between CPU and main memory.  The speed of cache memory is faster than main memory but is slower than registers.
  • 5. Cache Memory  Cache is cheaper than registers which justifies their use.  Cache is used to store that data and instructions which are frequently demanded by the running program, so that the number of main memory accesses can be reduced.  There are three types of cache memory.  Level-1 cache  Level-2 cache  Level-3 cache
  • 6. Level-1 Cache  Level-1 cache is built in to the actual processor core.  It is a piece of high speed memory which operates at the same speed as CPU.  It is directly accessible by the processor.  It holds data that the processor needs to execute instructions.  It is very expensive and small in size.  Its typical sizes are 8,16,32,64 or 128 KB.
  • 7. Level-2 Cache  Level-2 cache pulls information from RAM which is then accessed by the Level-1 Cache.  Level-2 Cache memory is faster and smaller in size than RAM but is slower and greater in size than Level-1 cache.  It is less expensive than Level-1 Cache.  Its size varies between 64 KB to 16 MB.  The purpose of Level-2 cache is to constantly read in slightly larger quantities of data from RAM to be available to Level-1 cache.  Level-2 cache is mostly built in to the processor chip but in some cases it lies on the motherboard.
  • 8. Level-3 Cache  Level-3 cache is specialized memory that works hand in hand with Level-1 and Level-2 cache to improve system performance.  Level-3 cache is the biggest cache memory.  It anticipates data requests so that processing instructions are provided without delay.  Level-3 cache is faster than RAM but slower than Level-1 and Level-2 cache.  CPU first looks for data and instructions in Level-1 cache then it checks Level-2 and Level-3 cache respectively.  Level-3 cache lies on motherboard.
  • 9. RAM  RAM stands for Random Access Memory is the most common type of memory found in computers.  It is also known as main memory or primary memory.  Instructions and data cannot be used by the processor until they are brought in to RAM.  It is a R/W memory and allow the computer to store and access data and instructions randomly.  RAM is volatile in nature which means that if the computer is turned off or a power failure occurs all the data contained in RAM is lost.
  • 10. Continued…  If the computer is turned off, all data contained in RAM is lost.  There are two types of RAM.  Static RAM(SRAM)  Dynamic RAM(DRAM)
  • 11. Static RAM(SRAM)  SRAM is a type of semi-conductor memory.  The word static indicates that it does not need to be periodically refreshed to retain its data.  SRAM is more expensive but faster and less power hungry than DRAM.  SRAM is mainly used to make CPU cache.  Because of its complex structure, it is expensive and cannot be used for high capacity storage.
  • 12. Dynamic RAM  DRAM is also a semi-conductor memory.  DRAM needs to be periodically refreshed to retain its contents.  It stores each bit of data in a separate capacitor within an integrated circuit.  The capacitor can be either charged or discharged.  In personal computers DRAM is used as main memory.  Because of their simple structure they allow high storage and are low cost.
  • 13. ROM  ROM stands for Read Only Memory.  ROM is a non-volatile memory which means that when power goes off it does not lose its information.  ROM is used for permanent storage of information.  It possesses random access property like RAM.  The contents of ROM are manufacturer supplied and cannot be changed by users/programmers.  There are three types of ROM.  PROM  EPROM  EEPROM
  • 14. PROM  PROM stands for Programmable Read Only Memory.  It is a type of ROM which can be programmed once and then can never be changed.  PROM is manufactured blank and then it is programmed just once.  The process is irreversible.  The data is fed in to it using PROM programs.
  • 15. EPROM  EPROM stands for Erasable Programmable Read Only Memory.  EPROM are non-volatile, they do not lose their content when power supply is cut off.  The content of EPROM chips can be erased using ultra-violet light.  They can be reprogrammed and reused many times.
  • 16. EEPROM  EEPROM stands for Electrically Erasable Programmable Read Only Memory.  EEPROM chips are also non-volatile.  The content of these chips can also be erased but using electricity instead of ultra violet light.  EEPROM chips can also be reprogrammed many times.