SlideShare a Scribd company logo
1 of 8
5/17/2014 By M.Zain
By M.Zain
1
Primary Memory
RAM
ROM
Secondary Memory
Floppy Disk
Thank You
5/17/2014by M.Zain
2
It is the internal memory that can be
directly accessed by the control unit of
CPU. It provides temporary storage for
data an instructions being processed and
information produced by ALU e.g. RAM
and ROM.
5/17/2014by M.Zain
3
It allows us to read as well as write
functions. The data or information stored in
this memory is not permanent. It gets lost
whenever the power is switched off. Thus it
is said to be volatile in nature.
5/17/2014by M.Zain
4
This memory allows only read functions.
The information once stored in its type of
memory cannot be changed. It is
permanent in nature and is said to be non-
volatile in nature.
5/17/2014by M.Zain
5
Secondary memory also known as
External or Auxiliary memory is used to
store a large amount of data permanently.
Some of secondary memory devices are
Hard disk, Floppy disk and etc.
5/17/2014by M.Zain
6
It is a circular plastic plate coated with
magnetic iron oxide, sealed inside a
protective plastic cover. It is portable and
can be easily carried from one place to
another.
5/17/2014by M.Zain
7
THANK
 YOU
5/17/2014by M.Zain
8

More Related Content

Similar to Memory in a computer system

R-O-M.pptx computer 10 slide shere ddddd
R-O-M.pptx computer 10 slide shere dddddR-O-M.pptx computer 10 slide shere ddddd
R-O-M.pptx computer 10 slide shere ddddd
mhamadhawlery16
 

Similar to Memory in a computer system (20)

Memory
MemoryMemory
Memory
 
Memory system of a compture
Memory system of a comptureMemory system of a compture
Memory system of a compture
 
Memory
MemoryMemory
Memory
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
 
TYPES OF MEMORY
TYPES OF MEMORYTYPES OF MEMORY
TYPES OF MEMORY
 
Computer_peripherals.pptx
Computer_peripherals.pptxComputer_peripherals.pptx
Computer_peripherals.pptx
 
memory and storage devices
memory and storage devicesmemory and storage devices
memory and storage devices
 
Presentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptxPresentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptx
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Computer fundamental unit 1
Computer fundamental unit 1Computer fundamental unit 1
Computer fundamental unit 1
 
EXTERNAL STORAGE OF A COMPUTER SYSTEM
EXTERNAL STORAGE OF A COMPUTER SYSTEMEXTERNAL STORAGE OF A COMPUTER SYSTEM
EXTERNAL STORAGE OF A COMPUTER SYSTEM
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
 
memory
memorymemory
memory
 
Memory 02
Memory 02Memory 02
Memory 02
 
FTCP-Computer-Memory..pdf
FTCP-Computer-Memory..pdfFTCP-Computer-Memory..pdf
FTCP-Computer-Memory..pdf
 
R-O-M.pptx computer 10 slide shere ddddd
R-O-M.pptx computer 10 slide shere dddddR-O-M.pptx computer 10 slide shere ddddd
R-O-M.pptx computer 10 slide shere ddddd
 
Rom hard on computer mmmmmmmnmmmmmnmmmmmnnn
Rom hard on computer mmmmmmmnmmmmmnmmmmmnnnRom hard on computer mmmmmmmnmmmmmnmmmmmnnn
Rom hard on computer mmmmmmmnmmmmmnmmmmmnnn
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
ComputerMemory.pdf
ComputerMemory.pdfComputerMemory.pdf
ComputerMemory.pdf
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

Memory in a computer system

  • 2. Primary Memory RAM ROM Secondary Memory Floppy Disk Thank You 5/17/2014by M.Zain 2
  • 3. It is the internal memory that can be directly accessed by the control unit of CPU. It provides temporary storage for data an instructions being processed and information produced by ALU e.g. RAM and ROM. 5/17/2014by M.Zain 3
  • 4. It allows us to read as well as write functions. The data or information stored in this memory is not permanent. It gets lost whenever the power is switched off. Thus it is said to be volatile in nature. 5/17/2014by M.Zain 4
  • 5. This memory allows only read functions. The information once stored in its type of memory cannot be changed. It is permanent in nature and is said to be non- volatile in nature. 5/17/2014by M.Zain 5
  • 6. Secondary memory also known as External or Auxiliary memory is used to store a large amount of data permanently. Some of secondary memory devices are Hard disk, Floppy disk and etc. 5/17/2014by M.Zain 6
  • 7. It is a circular plastic plate coated with magnetic iron oxide, sealed inside a protective plastic cover. It is portable and can be easily carried from one place to another. 5/17/2014by M.Zain 7