The document discusses different types of computer memory, including volatile memory like RAM and non-volatile memory like ROM. It describes the history of memory technologies from early devices like delay lines to modern semiconductors. The types and management of memory are also covered, including topics like virtual memory and protected memory.
The document discusses the basics of semiconductor memories. It explains that memory controllers establish information flow between memory and the CPU. Memory buses connect memory to the controller. Newer systems have frontside and backside buses connecting different components. During boot-up, the BIOS and operating system are loaded from ROM and hard drive into RAM for fast access by the CPU. Applications and files are also loaded into and removed from RAM as needed. The document compares different types of volatile and non-volatile memory in terms of speed, size, and cost.
Semiconductor memories have become essential in electronics as processors have become more common and software more sophisticated, greatly increasing the need for memory. There are several types of semiconductor memory technologies that have emerged to meet different needs, including DRAM, SRAM, SDRAM, EEPROM, flash memory, and the newer MRAM. Each type has its advantages for different applications like main memory, caches, and non-volatile storage.
This document provides an overview of different types of computer memory, including RAM and ROM. It distinguishes between common RAM types like SDRAM, DDR, DDR2 and DDR3. It also describes different memory packaging standards including SIMMs, DIMMs and RIMMs. Key characteristics of memory like clock speed, data transfer rate and error checking are defined.
Primary memory, also called main memory or volatile memory, is directly accessible to the CPU and includes RAM and ROM. RAM is temporary memory that loses its contents when power is lost, while ROM permanently stores essential programs and instructions. Secondary memory, also called external storage, includes hard drives and solid state drives and provides significantly more storage than primary memory but is not directly accessible by the CPU. Memory is classified and its functions are explained.
This document discusses the classification and hierarchy of memory systems in computers. It begins by explaining that computers utilize a memory hierarchy to efficiently store and access programs and data, since not all information is needed by the CPU at once. The hierarchy includes register sets, cache memory, main memory (RAM and ROM), hard disks, magnetic disks, and magnetic tapes, which differ in access time, transfer rate, and capacity. Faster but smaller and more expensive memory like registers are at the top, while larger but slower memory like hard disks are at the bottom. Understanding this memory hierarchy is important for knowing how computers access and manage programs and data.
Memory refers to computer components that hold digital data and programs. There are several types of memory that differ in speed and volatility. Primary storage like RAM is directly connected to the CPU and is volatile, requiring constant power. Secondary storage like hard disks have greater capacity but are slower and non-volatile. Tertiary storage provides even larger capacity for archiving data. Memory is also characterized as volatile, like RAM, or non-volatile, like ROM.
This document discusses different types of computer memory. It begins by defining memory as the physical devices used to temporarily or permanently store programs and data for use in a computer. It then describes the main types of memory as main memory, which temporarily stores currently executing data and instructions (e.g. RAM), and secondary memory, which permanently stores data for later use (e.g. hard disks). The document goes on to provide details on different technologies used for RAM, ROM, cache memory, and storage devices.
This document provides an overview of computer memory (RAM) including its history, types, and technology. RAM temporarily stores information for programs to run and comes in two main types - DRAM and SRAM. The document traces the history of RAM from early technologies like delay lines and magnetic core memory to modern semiconductors. It also describes memory modules like SIMMs, DIMMs, and RIMMs and emerging memory technologies like MRAM and RRAM that could replace conventional RAM.
The document discusses the basics of semiconductor memories. It explains that memory controllers establish information flow between memory and the CPU. Memory buses connect memory to the controller. Newer systems have frontside and backside buses connecting different components. During boot-up, the BIOS and operating system are loaded from ROM and hard drive into RAM for fast access by the CPU. Applications and files are also loaded into and removed from RAM as needed. The document compares different types of volatile and non-volatile memory in terms of speed, size, and cost.
Semiconductor memories have become essential in electronics as processors have become more common and software more sophisticated, greatly increasing the need for memory. There are several types of semiconductor memory technologies that have emerged to meet different needs, including DRAM, SRAM, SDRAM, EEPROM, flash memory, and the newer MRAM. Each type has its advantages for different applications like main memory, caches, and non-volatile storage.
This document provides an overview of different types of computer memory, including RAM and ROM. It distinguishes between common RAM types like SDRAM, DDR, DDR2 and DDR3. It also describes different memory packaging standards including SIMMs, DIMMs and RIMMs. Key characteristics of memory like clock speed, data transfer rate and error checking are defined.
Primary memory, also called main memory or volatile memory, is directly accessible to the CPU and includes RAM and ROM. RAM is temporary memory that loses its contents when power is lost, while ROM permanently stores essential programs and instructions. Secondary memory, also called external storage, includes hard drives and solid state drives and provides significantly more storage than primary memory but is not directly accessible by the CPU. Memory is classified and its functions are explained.
This document discusses the classification and hierarchy of memory systems in computers. It begins by explaining that computers utilize a memory hierarchy to efficiently store and access programs and data, since not all information is needed by the CPU at once. The hierarchy includes register sets, cache memory, main memory (RAM and ROM), hard disks, magnetic disks, and magnetic tapes, which differ in access time, transfer rate, and capacity. Faster but smaller and more expensive memory like registers are at the top, while larger but slower memory like hard disks are at the bottom. Understanding this memory hierarchy is important for knowing how computers access and manage programs and data.
Memory refers to computer components that hold digital data and programs. There are several types of memory that differ in speed and volatility. Primary storage like RAM is directly connected to the CPU and is volatile, requiring constant power. Secondary storage like hard disks have greater capacity but are slower and non-volatile. Tertiary storage provides even larger capacity for archiving data. Memory is also characterized as volatile, like RAM, or non-volatile, like ROM.
This document discusses different types of computer memory. It begins by defining memory as the physical devices used to temporarily or permanently store programs and data for use in a computer. It then describes the main types of memory as main memory, which temporarily stores currently executing data and instructions (e.g. RAM), and secondary memory, which permanently stores data for later use (e.g. hard disks). The document goes on to provide details on different technologies used for RAM, ROM, cache memory, and storage devices.
This document provides an overview of computer memory (RAM) including its history, types, and technology. RAM temporarily stores information for programs to run and comes in two main types - DRAM and SRAM. The document traces the history of RAM from early technologies like delay lines and magnetic core memory to modern semiconductors. It also describes memory modules like SIMMs, DIMMs, and RIMMs and emerging memory technologies like MRAM and RRAM that could replace conventional RAM.
Semiconductor memory is a digital electronic semiconductor device used for digital data storage, such as computer memory. It typically refers to MOS memory.
Memory is used to store data and instructions and is divided into small parts called cells. There are two types of memory: internal memory (cache and main memory) and external memory (magnetic disks, optical disks). Memory characteristics like capacity, cost, and access time change as we move from top to bottom of the memory hierarchy. RAM is the main internal memory and can be accessed randomly, but is volatile. There are two types of RAM: SRAM and DRAM. ROM is non-volatile and can only be read from. Examples are ROM, PROM, EPROM, and EEPROM. Cache memory is very fast memory between the CPU and main memory. Virtual memory allows programs larger than physical memory.
RAM is the primary memory of a computer that can access any memory cell directly. The two main types are DRAM and SRAM. DRAM (dynamic RAM) is commonly used in computers and needs to be refreshed to retain data. It stores each bit in a storage cell with a capacitor and transistor. ROM is a permanent, non-volatile memory that usually cannot be written to by the user. The main types are PROM, EPROM, EEPROM and flash memory.
Computer memory can be divided into primary and secondary memory. Primary memory, also called main memory, is directly accessible by the CPU and includes RAM and ROM. RAM is volatile and can be SRAM or DRAM, while ROM is non-volatile and includes PROM, EPROM, and EEPROM. Secondary memory refers to non-volatile storage devices like hard drives, solid state drives, USB drives, CDs, and DVDs that are not directly accessible by the CPU.
RAM allows stored data to be accessed directly in any random order. There are two main types: static RAM and dynamic RAM. Static RAM keeps data without refreshing but is more expensive, while dynamic RAM needs refreshing but is cheaper. RAM is a temporary memory that does not store data permanently once power is turned off. Future RAM technologies aim to provide smaller, faster, and cheaper memory chips compared to today's options like DDR3 RAM.
This document discusses different types of computer memory. It begins by introducing primary memory which includes RAM and ROM. It then describes different types of RAM like SRAM, DRAM, RDRAM and their structures. Next it covers different types of ROM like PROM, EPROM, and EEPROM. It also discusses the memory hierarchy and how cache memory improves performance. Finally, it summarizes different types of secondary storage like hard disk drives, their layout and various RAID configurations.
Third generation semiconductor memories provide improvements over earlier magnetic-based computer memories. There are two main types of semiconductor memory - RAM and ROM. RAM allows reading and writing and is used for temporary data storage, while ROM only allows reading and is used for permanent storage. Over time, new technologies like DRAM, SRAM, EEPROM, Flash memory were developed with improvements in speed, density, power consumption and non-volatility. Research continues into developing even more advanced memory technologies.
Memory is essential for computers and comes in three main types: primary, cache, and secondary. Primary memory (RAM) is directly accessible by the CPU and comes in volatile forms like DRAM and SRAM. Cache memory improves access speed and can be L1/L2 caches. Secondary memory (hard disks, DVDs) provides large storage but is slower to access. The document discusses these memory types in detail along with their technologies and principles.
A computer uses a hierarchy of internal and external memory systems. Internal memory includes RAM, ROM, and cache, which provide fast access but are more expensive per byte. RAM allows independent access to each memory location and is used for main memory. ROM permanently stores data and is used for boot programs. Cached memory uses SRAM for faster access than RAM. External memory includes hard disks and USB drives, which provide large, inexpensive storage but are much slower to access.
This document discusses random access memory (RAM). It defines RAM as a form of computer data storage that allows accessing stored data in any random order. The document summarizes the characteristics, types, and evolution of RAM including static RAM, dynamic RAM, synchronous DRAM, and asynchronous DRAM. It also compares RAM and ROM and discusses modern RAM technologies and other applications of RAM like virtual memory and RAM disks.
Computer memory comes in a memory hierarchy from fastest and smallest to slower and larger. At the top are CPU registers for temporary storage, followed by cache memory for faster access. Main memory (RAM) is volatile storage inside the computer. Secondary storage devices like hard disks and optical disks provide non-volatile storage of large amounts of data. Memory and storage technologies use electrical charges, magnetic fields, or pits and lands on optical media to store binary data representing 0s and 1s.
Main memory is made up of RAM and ROM chips. RAM is read-write memory that can be accessed randomly; data is lost when power is off. There are static and dynamic RAM types. Static RAM retains data indefinitely if powered, dynamic RAM must be periodically refreshed. ROM is read-only and permanently stores data. There are mask, PROM, EPROM and EEPROM ROM types that can be programmed at different stages. Cache memory uses fast static RAM. Main memory often uses dynamic RAM for its ability to store large amounts of data at lower cost despite slower access.
The document discusses memory hierarchy as a solution for modern computing. It describes Moore's Laws of increasing transistor density and chip fabrication costs over time. An ideal memory would have zero access time, infinite capacity and bandwidth, and zero cost, but real memories involve tradeoffs between speed, size, quality, and cost. A memory hierarchy organizes memory into different levels from fastest and smallest (registers) to slowest and largest (disks). Virtual memory allows computers to use disk storage like memory using page files. Offline and portable memories refer to removable secondary storage media.
The document discusses computer memory, including random access memory (RAM) and how it works. It provides three key points:
1) RAM is the computer's temporary storage area that allows the CPU to access data more quickly than from permanent storage like a hard drive. When applications, files, or programs are opened they are loaded into RAM.
2) The CPU continuously requests data from RAM, processes it, and writes new data back to RAM in a cycle that happens millions of times per second.
3) When an application closes, it and any files are purged from RAM to free up space, so they must be saved to permanent storage or the changes will be lost.
Main memory (RAM) is faster than secondary memory as it is directly accessible by the CPU. Secondary memory (hard disk, optical disks etc.) is slower than main memory but can store data permanently even when the power is turned off. The program and data of a game are stored on the secondary memory (hard disk) and parts are copied to main memory as needed when playing the game.
The document discusses the history and types of computer memory. It begins by describing early memory technologies from the 1940s like delay line memory and magnetic core memory. Random access memory later emerged in the 1940s including the Williams tube and Selectron tube. Magnetic core memory became the dominant memory technology through the 1960s. The document then describes the main types of memory - ROM, RAM, cache memory, and flash memory. RAM is the most common type and is either DRAM or SRAM. Memory is measured in bytes, kilobytes, megabytes etc. and is stored on memory modules that fit into slots on the motherboard.
This document discusses different types of semiconductor memory used in computing systems. It describes volatile memory like static RAM (SRAM) and dynamic RAM (DRAM), as well as non-volatile memory such as ROM, MRAM, and flash memory. The basic unit of semiconductor memory is the memory cell, which can store a single bit using MOS or CMOS fabrication. Memory architectures are organized in arrays or hierarchies to store large amounts of data within computer systems.
Memory Hierarchy
The memory unit is an essential component in any digital computer since it is needed for storing programs and data
Not all accumulated information is needed by the CPU at the same time
Therefore, it is more economical to use low-cost storage devices to serve as a backup for storing the information that is not currently used by CPU
auxiliary memory
main memory
cache memory
RAM– Random Access memory
Random Access Memory Types
Dynamic RAM (DRAM)
ROM(Read Only Memory)
ROM(Read Only Memory)
Semiconductor memories and auxiliary memoriesAsif Iqbal
In these slides the concept of semiconductor memories have been explained in detail. With the clear dramatisation of CMOS logics. Auxiliary memories and its type have also been discussed.
This document discusses computer memory and the memory hierarchy. It begins by introducing primary and secondary memory. Primary memory, like RAM, is used to process data and instructions directly, while secondary memory, like hard disks, is used for long-term storage. It then describes the memory hierarchy, with internal processor memory and cache at the top for fastest access, primary/RAM memory next, and secondary disk storage at the bottom. The document focuses on RAM, describing its purpose to temporarily store active data and programs, and how it must be refreshed to maintain data in dynamic RAM unlike static RAM.
Millepede- MEMS based memory device from IBMHarsha
The document summarizes Millipede memory, a non-volatile computer memory device developed by IBM with a data density over 1 terabit per square inch. It uses a 2D array of micro-mechanical silicon probes to store data as nanoscopic pits burned into a polymer substrate. Each probe can read or write data individually in a parallel manner to achieve high data rates. While offering high density storage, Millipede memory also allows low power operation but has limitations in rewrite cycles and costs. Further research focuses on improving writing, reading and error correction methods to increase storage capacity beyond 1 terabit per square inch.
This document discusses internal memory organization and technologies. It begins with an overview of memory cell operation for DRAM and SRAM. It then covers various memory types including DRAM, SRAM, ROM, PROM, EPROM, and EEPROM. Advanced DRAM technologies like synchronous DRAM, Rambus DRAM, and double data rate SDRAM are also summarized. The document concludes with sections on error correction techniques and cache DRAM.
Semiconductor memory is a digital electronic semiconductor device used for digital data storage, such as computer memory. It typically refers to MOS memory.
Memory is used to store data and instructions and is divided into small parts called cells. There are two types of memory: internal memory (cache and main memory) and external memory (magnetic disks, optical disks). Memory characteristics like capacity, cost, and access time change as we move from top to bottom of the memory hierarchy. RAM is the main internal memory and can be accessed randomly, but is volatile. There are two types of RAM: SRAM and DRAM. ROM is non-volatile and can only be read from. Examples are ROM, PROM, EPROM, and EEPROM. Cache memory is very fast memory between the CPU and main memory. Virtual memory allows programs larger than physical memory.
RAM is the primary memory of a computer that can access any memory cell directly. The two main types are DRAM and SRAM. DRAM (dynamic RAM) is commonly used in computers and needs to be refreshed to retain data. It stores each bit in a storage cell with a capacitor and transistor. ROM is a permanent, non-volatile memory that usually cannot be written to by the user. The main types are PROM, EPROM, EEPROM and flash memory.
Computer memory can be divided into primary and secondary memory. Primary memory, also called main memory, is directly accessible by the CPU and includes RAM and ROM. RAM is volatile and can be SRAM or DRAM, while ROM is non-volatile and includes PROM, EPROM, and EEPROM. Secondary memory refers to non-volatile storage devices like hard drives, solid state drives, USB drives, CDs, and DVDs that are not directly accessible by the CPU.
RAM allows stored data to be accessed directly in any random order. There are two main types: static RAM and dynamic RAM. Static RAM keeps data without refreshing but is more expensive, while dynamic RAM needs refreshing but is cheaper. RAM is a temporary memory that does not store data permanently once power is turned off. Future RAM technologies aim to provide smaller, faster, and cheaper memory chips compared to today's options like DDR3 RAM.
This document discusses different types of computer memory. It begins by introducing primary memory which includes RAM and ROM. It then describes different types of RAM like SRAM, DRAM, RDRAM and their structures. Next it covers different types of ROM like PROM, EPROM, and EEPROM. It also discusses the memory hierarchy and how cache memory improves performance. Finally, it summarizes different types of secondary storage like hard disk drives, their layout and various RAID configurations.
Third generation semiconductor memories provide improvements over earlier magnetic-based computer memories. There are two main types of semiconductor memory - RAM and ROM. RAM allows reading and writing and is used for temporary data storage, while ROM only allows reading and is used for permanent storage. Over time, new technologies like DRAM, SRAM, EEPROM, Flash memory were developed with improvements in speed, density, power consumption and non-volatility. Research continues into developing even more advanced memory technologies.
Memory is essential for computers and comes in three main types: primary, cache, and secondary. Primary memory (RAM) is directly accessible by the CPU and comes in volatile forms like DRAM and SRAM. Cache memory improves access speed and can be L1/L2 caches. Secondary memory (hard disks, DVDs) provides large storage but is slower to access. The document discusses these memory types in detail along with their technologies and principles.
A computer uses a hierarchy of internal and external memory systems. Internal memory includes RAM, ROM, and cache, which provide fast access but are more expensive per byte. RAM allows independent access to each memory location and is used for main memory. ROM permanently stores data and is used for boot programs. Cached memory uses SRAM for faster access than RAM. External memory includes hard disks and USB drives, which provide large, inexpensive storage but are much slower to access.
This document discusses random access memory (RAM). It defines RAM as a form of computer data storage that allows accessing stored data in any random order. The document summarizes the characteristics, types, and evolution of RAM including static RAM, dynamic RAM, synchronous DRAM, and asynchronous DRAM. It also compares RAM and ROM and discusses modern RAM technologies and other applications of RAM like virtual memory and RAM disks.
Computer memory comes in a memory hierarchy from fastest and smallest to slower and larger. At the top are CPU registers for temporary storage, followed by cache memory for faster access. Main memory (RAM) is volatile storage inside the computer. Secondary storage devices like hard disks and optical disks provide non-volatile storage of large amounts of data. Memory and storage technologies use electrical charges, magnetic fields, or pits and lands on optical media to store binary data representing 0s and 1s.
Main memory is made up of RAM and ROM chips. RAM is read-write memory that can be accessed randomly; data is lost when power is off. There are static and dynamic RAM types. Static RAM retains data indefinitely if powered, dynamic RAM must be periodically refreshed. ROM is read-only and permanently stores data. There are mask, PROM, EPROM and EEPROM ROM types that can be programmed at different stages. Cache memory uses fast static RAM. Main memory often uses dynamic RAM for its ability to store large amounts of data at lower cost despite slower access.
The document discusses memory hierarchy as a solution for modern computing. It describes Moore's Laws of increasing transistor density and chip fabrication costs over time. An ideal memory would have zero access time, infinite capacity and bandwidth, and zero cost, but real memories involve tradeoffs between speed, size, quality, and cost. A memory hierarchy organizes memory into different levels from fastest and smallest (registers) to slowest and largest (disks). Virtual memory allows computers to use disk storage like memory using page files. Offline and portable memories refer to removable secondary storage media.
The document discusses computer memory, including random access memory (RAM) and how it works. It provides three key points:
1) RAM is the computer's temporary storage area that allows the CPU to access data more quickly than from permanent storage like a hard drive. When applications, files, or programs are opened they are loaded into RAM.
2) The CPU continuously requests data from RAM, processes it, and writes new data back to RAM in a cycle that happens millions of times per second.
3) When an application closes, it and any files are purged from RAM to free up space, so they must be saved to permanent storage or the changes will be lost.
Main memory (RAM) is faster than secondary memory as it is directly accessible by the CPU. Secondary memory (hard disk, optical disks etc.) is slower than main memory but can store data permanently even when the power is turned off. The program and data of a game are stored on the secondary memory (hard disk) and parts are copied to main memory as needed when playing the game.
The document discusses the history and types of computer memory. It begins by describing early memory technologies from the 1940s like delay line memory and magnetic core memory. Random access memory later emerged in the 1940s including the Williams tube and Selectron tube. Magnetic core memory became the dominant memory technology through the 1960s. The document then describes the main types of memory - ROM, RAM, cache memory, and flash memory. RAM is the most common type and is either DRAM or SRAM. Memory is measured in bytes, kilobytes, megabytes etc. and is stored on memory modules that fit into slots on the motherboard.
This document discusses different types of semiconductor memory used in computing systems. It describes volatile memory like static RAM (SRAM) and dynamic RAM (DRAM), as well as non-volatile memory such as ROM, MRAM, and flash memory. The basic unit of semiconductor memory is the memory cell, which can store a single bit using MOS or CMOS fabrication. Memory architectures are organized in arrays or hierarchies to store large amounts of data within computer systems.
Memory Hierarchy
The memory unit is an essential component in any digital computer since it is needed for storing programs and data
Not all accumulated information is needed by the CPU at the same time
Therefore, it is more economical to use low-cost storage devices to serve as a backup for storing the information that is not currently used by CPU
auxiliary memory
main memory
cache memory
RAM– Random Access memory
Random Access Memory Types
Dynamic RAM (DRAM)
ROM(Read Only Memory)
ROM(Read Only Memory)
Semiconductor memories and auxiliary memoriesAsif Iqbal
In these slides the concept of semiconductor memories have been explained in detail. With the clear dramatisation of CMOS logics. Auxiliary memories and its type have also been discussed.
This document discusses computer memory and the memory hierarchy. It begins by introducing primary and secondary memory. Primary memory, like RAM, is used to process data and instructions directly, while secondary memory, like hard disks, is used for long-term storage. It then describes the memory hierarchy, with internal processor memory and cache at the top for fastest access, primary/RAM memory next, and secondary disk storage at the bottom. The document focuses on RAM, describing its purpose to temporarily store active data and programs, and how it must be refreshed to maintain data in dynamic RAM unlike static RAM.
Millepede- MEMS based memory device from IBMHarsha
The document summarizes Millipede memory, a non-volatile computer memory device developed by IBM with a data density over 1 terabit per square inch. It uses a 2D array of micro-mechanical silicon probes to store data as nanoscopic pits burned into a polymer substrate. Each probe can read or write data individually in a parallel manner to achieve high data rates. While offering high density storage, Millipede memory also allows low power operation but has limitations in rewrite cycles and costs. Further research focuses on improving writing, reading and error correction methods to increase storage capacity beyond 1 terabit per square inch.
This document discusses internal memory organization and technologies. It begins with an overview of memory cell operation for DRAM and SRAM. It then covers various memory types including DRAM, SRAM, ROM, PROM, EPROM, and EEPROM. Advanced DRAM technologies like synchronous DRAM, Rambus DRAM, and double data rate SDRAM are also summarized. The document concludes with sections on error correction techniques and cache DRAM.
This document discusses semiconductor memory and its components. It begins with an overview of memory chip configuration, including the memory cell array, decoders, and input/output buffers. It then classifies different types of semiconductor memory like RAM, ROM, and discusses technologies like DRAM, SRAM, EEPROM in detail. It describes the key components like decoders, sense amplifiers and their operation. It discusses reliability and yield considerations and concludes with increasing memory requirements with growing software sophistication.
Registered RAM modules are commonly used in servers and equipment. They contain integrated circuits that regenerate address and control signals using an onboard PLL. Data signals pass directly from the memory bus to the RAM ICs. RAM is used as working memory by the operating system, programs, and software. Within the system hierarchy, RAM sits below processor registers and caches as relatively fast, medium-capacity memory. Current RAM technologies use synchronous signals synchronized to the memory bus clock, unlike older asynchronous designs. RAM modules are printed circuit boards containing silicon memory chips attached via copper or pins.
This document summarizes different types of random access memory (RAM), including static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), and double data rate SDRAM (DDR SDRAM). It describes the basic operation and characteristics of each type of RAM, such as the use of transistors and capacitors, refresh requirements, packaging, and timing. Key details covered include the differences between SRAM and DRAM, DRAM refresh requirements, DRAM and SDRAM timing diagrams, and how DDR SDRAM transfers data on both clock edges.
Memory is an essential component of computers that is used to store programs and data. Computers typically have three levels of memory: main memory, secondary memory, and cache memory. Main memory is fast memory that stores programs and data being executed. Secondary memory is permanent storage for programs and data used less frequently. Cache memory sits between the CPU and main memory for faster access. Memory is also classified by location, access method, volatility, and type.
This document discusses different types of computer memory. It describes main memory, which is used for immediate access by the CPU, and secondary memory, which stores much larger amounts of data for longer periods. The main types of main memory are RAM, ROM, cache, and registers. RAM and ROM are further divided into static, dynamic, programmable, erasable, and electronically erasable types. Secondary memory includes magnetic disks, tapes, CD-ROMs, and solid-state storage. Hard disks can be internal, removable cartridges, or disk packs.
Lec11 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part3Hsien-Hsin Sean Lee, Ph.D.
This document discusses DRAM and storage systems. It begins by describing the basic DRAM cell and how DRAM is organized into banks, rows, and columns. It then covers DRAM operation including refreshing and different DRAM standards. The document also discusses disk organization with platters, tracks, and sectors. It provides details on disk access times and reliability techniques like RAID levels 0 through 6 which use data mirroring, striping, and error correction codes.
Storage provides capacity for files and information through devices like hard disks, while memory provides working space through RAM. Primary storage includes RAM and cache for running the computer, while secondary storage is long-term storage like hard disks. RAM is volatile memory used for running programs, coming in static RAM and dynamic RAM forms. ROM is read-only memory storing basic instructions. Cache memory improves performance by storing frequently used data and instructions. Optical storage includes CDs, DVDs, and Blu-rays, while magnetic storage encompasses floppy disks and hard disks. Flash memory offers portable options like USB drives and solid-state drives.
This document provides an overview of the design of a dual port SRAM using Verilog HDL. It begins with an introduction describing the objectives and accomplishments of the project. It then reviews relevant literature on SRAM design. The document describes the FPGA design flow and introduces Verilog. It provides the design and operation of the SRAM, and discusses simulation results and conclusions. The proposed 8-bit dual port SRAM utilizes negative bitline techniques during write operations to improve write ability and reduce power consumption and area compared to conventional designs.
This document discusses different types of computer memory and storage devices. It defines primary and secondary storage. Primary storage includes RAM and ROM, which temporarily and permanently store data respectively. RAM is volatile and includes DRAM, SRAM, and RDRAM. ROM is non-volatile and includes PROM, EPROM, EEPROM, and flash memory. The document provides details on each type of memory, including their characteristics and uses.
Computer memory can be divided into primary/main memory and secondary memory. Primary memory is directly accessible by the CPU and can be volatile, losing data on power loss. It includes RAM (random access memory) such as SRAM and DRAM. Secondary memory includes non-volatile storage like hard disks, CDs, DVDs that are accessed via I/O. The document discusses different types of primary memory like cache, RAM, ROM and their characteristics. It also covers memory management techniques like paging, segmentation and virtual memory that allow accessing more memory than physically installed.
The document discusses different types of computer memory including volatile memory, non-volatile memory, and registers. Volatile memory like RAM loses data when powered off, while non-volatile memory like ROM retains data without power. Virtual memory uses the hard disk to supplement RAM. Registers are high-speed memory areas within the CPU used to store data and instructions during processing. The document describes memory types like SRAM, DRAM, ROM, and flash memory as well as register functions.
This document discusses virtual memory and cache memory. It defines virtual memory as a technique that allows programs to behave as if they have contiguous memory even if the actual physical memory is fragmented. It also describes how virtual memory provides each process with its own address space and hides fragmentation. The document also defines cache memory as a small, fast memory located close to the CPU that stores frequently accessed instructions and data to improve performance. It describes levels 1 and 2 caches and how they work with memory and disk caches.
This document defines and categorizes different types of computer memory. It discusses the key differences between volatile and non-volatile memory, primary and secondary memory, ROM and RW memory, and random access versus sequential access memory. It also covers different memory technologies like RAM, ROM, cache memory, and how memory can be classified based on the underlying storage media.
Here is a slide on Random Access Memory, slide consists of detailed presentation on primary Memory,types and history of RAM. Hope you will Enjoy the slide.
Here are the answers:
1. SRAM is static RAM that does not require periodic refreshing. It is faster but more expensive than DRAM, which is dynamic RAM that must be refreshed periodically.
2. The functions of ROM are to permanently store basic input/output instructions for the computer and to hold firmware like the BIOS. ROM maintains its data without power and can usually only be read from, not written to.
3. The different types and levels of CPU caches are:
- Level 1 (L1) cache, which is the smallest and fastest cache built directly into the CPU chip.
- Level 2 (L2) cache, which is external to the CPU chip but still on the processor
Topic 10- Random Access Memory (RAM).pptxMartMantilla1
RAM allows data to be accessed randomly in any order. It is a type of volatile memory, meaning data is lost when power is turned off. There are two main types: static RAM and dynamic RAM. Static RAM does not need to be refreshed but takes up more space, while dynamic RAM needs refreshing but can store more data. Future RAM technologies aim to provide smaller, faster, and cheaper memory chips compared to today's RAM.
The document summarizes different types of computer memory. It describes RAM as volatile memory that can be randomly accessed. There are two main types of RAM: DRAM uses capacitors and must be refreshed, while SRAM uses flip-flops and does not need refreshing. The document also discusses cache memory, ROM, EPROM, EEPROM, flash memory, memory organization, errors and interleaving.
The document discusses the differences between computer memory and storage. It defines memory as temporary data storage that exists on chips, while storage refers to long-term data storage on tapes or disks. It describes primary memory (RAM) as volatile memory that allows quick access to data but must be constantly powered, while secondary storage (hard disks, optical disks) allows permanent long-term storage but is slower to access. The document provides examples of different types of memory chips (ROM, RAM) and storage devices (hard disks, optical disks).
RAM is a type of volatile memory that is used for temporary storage. It allows data to be accessed randomly in any order. There are different types of RAM such as static RAM, dynamic RAM, SDRAM, and DDR SDRAM. RAM is part of a memory hierarchy that includes processor registers, cache memory levels L1-L3, main memory, and virtual memory. Future RAM technologies aim to provide memory that is smaller, faster, and cheaper than current memory chips.
The document discusses memory architectures including Harvard and Von Neumann architectures. It provides details on each:
- The Harvard architecture has separate memory for instructions and data allowing parallel access, but is more expensive.
- The Von Neumann architecture shares memory for instructions and data through a common bus, making it simpler but limiting parallelism.
- It also discusses memory types like RAM, SRAM, and DRAM and cache memory levels L1 and L2. RAM is volatile memory used for main memory, while SRAM is faster but more expensive and used for caches. DRAM is cheaper than SRAM but needs refresh cycles. Caches improve performance by storing recently used data and instructions from main memory.
This document provides an overview of computer memory and how it works. It discusses the different types of memory including RAM, ROM, cache, and virtual memory. It explains that memory is used to temporarily store data for quick access by the CPU. RAM is the main memory and it must be regularly refreshed to prevent data loss. Cache memory provides very fast access to frequently used data. The document also describes how memory is organized into a hierarchy with the fastest memory like cache at the top and slower long-term storage like hard disks at the bottom.
The document discusses different types of computer memory. It describes cache memory as very high speed memory between the CPU and main memory used to store frequently accessed data and programs. Primary/main memory is volatile semiconductor memory that holds currently running programs and data. RAM and ROM are types of main memory. RAM is read/write memory that stores data temporarily while power is on, while ROM is read-only memory that permanently stores basic input/output instructions. The document outlines characteristics and types of each memory including static RAM, dynamic RAM, programmable ROM, erasable programmable ROM, and electrically erasable programmable ROM.
This document discusses different types of computer memory organization. It describes main memory, which includes ROM, RAM, PROM, EPROM, and EEPROM. ROM is used for storing permanent programs and data. RAM is used for storing user programs and data temporarily. PROM, EPROM, and EEPROM can be programmed but EPROM and EEPROM can also be erased. Secondary storage includes magnetic tapes, floppy disks, hard disks, optical disks, and RAM disks. Floppy disks and hard disks provide faster and direct access compared to tapes but hard disks provide much higher storage capacity than floppy disks. Optical disks have high storage capacity but data cannot be erased.
This document discusses computer memory systems including main memory, cache, and virtual memory. It defines main memory as the central storage location that holds programs and data currently being used by the CPU. The document outlines memory hierarchy from fastest to slowest as registers, cache, main memory, and secondary storage. It describes RAM and ROM types as well as cache memory. Locality of reference and memory technologies such as magnetic disks are also summarized.
This document provides an overview and introduction to the Computer Systems course being taught. It outlines the course content which includes memory organization, CPU organization and operation, and assembly programming. It provides contact information for the instructor and details on exams, textbooks, and the course website. It then discusses the characteristics of different types of computer memory including registers, main memory, disk memory, and different technologies for RAM such as SRAM, DRAM, SDRAM, and DDR SDRAM.
This document provides an overview of cryptography. It begins with an introduction to cryptography and its history, both in ancient times where it was used primarily for military purposes and more recently for commercial use. It defines key cryptography terms and discusses symmetric and asymmetric key cryptography as well as common algorithms like block ciphers. It also covers public key cryptography and the advantages it provides over symmetric key cryptography through the use of public and private key pairs. The document concludes with a brief discussion of common types of attacks on cryptosystems.
Anil Jain is seeking a middle level position in project management, system administration, or network architecture. He has over 2 years of experience in these areas. He is currently a Network Engineer at South Asia FM Ltd. He has skills in project management, networking, systems analysis, and technical support. He has experience with Windows, Linux, Cisco routers and switches, databases, and other applications.
Sana Khan is seeking a professionally satisfying and challenging career where her knowledge in computer hardware, networking, and systems administration can be utilized. She has over two years of experience planning, implementing, administering, and troubleshooting multiple operating systems. As a Network Administrator, her responsibilities included administrating servers, managing user accounts, installing and maintaining network components, monitoring systems, and troubleshooting various issues. She has technical skills in Windows, networking, hardware, and certifications in networking and fiber optics.
This resume is for Anil Kumar seeking a role in electronics, instrumentation, or communications engineering. He has a B-Tech degree in electronics and communication engineering from JNTU with 85% marks. His academic projects include creating an E1 link and BER measurement system and implementing a touch screen wheelchair. He has training in PLCs, SCADA, DCS, and LabVIEW programming. Anil is proficient in Windows, C, C++, Java, and MS Office. He seeks to apply his skills in instrumentation, digital electronics, automation, PLCs/SCADA, and computer architecture. He works well in teams and aims to learn new technologies quickly.
This document provides an overview of read-only memory (ROM). It discusses the history and development of ROM, from early mask ROM to newer technologies like EEPROM and flash memory. ROM has traditionally been used to store firmware and other data that does not need to be modified. The document outlines different types of ROM and semiconductor-based memory technologies, as well as some historical examples of ROM implementations.
Assets are economic resources owned by a business that are expected to provide future benefits. Assets are classified as fixed assets, current assets, and fictitious assets. Fixed assets are used long-term in the business, while current assets are expected to be converted to cash or used in production within a year. Examples of current assets include cash, inventory, and accounts receivable. Fictitious assets have no real value. The accounting equation states that assets must equal liabilities plus owners' equity.
The National Stock Exchange of India (NSE) is the leading stock exchange of India. Located in Mumbai, NSE was established in 1992 as the first demutualized electronic exchange in the country. It facilitates trading in equities, derivatives, debt instruments and commodities.
Rekha Singh is writing a letter to the principal of DGM, LKNC, CSC Delhi requesting a summer internship at the circle office in Noida. She is currently a first year student studying PGDM at Appejay Institute of Technology in Greater Noida. She has included her curriculum vitae which provides details of her qualifications and experience. She requests that her application be considered and she would be greatly obliged for the opportunity.
The document summarizes a revised NIELIT syllabus book that is divided into eight chapters and two appendices. Each chapter covers topics as outlined in the revised syllabus and includes model questions and answers. Additionally, screenshots and notes are included to aid in easily understanding the subject matter.
Hero MotoCorp Ltd. is India's largest motorcycle manufacturer. It was founded in 1984 as a joint venture between Hero Cycles and Honda Motor Company. In 2010, Hero Group bought Honda's stake in the company, and it was renamed Hero MotoCorp in 2011. Hero MotoCorp produces motorcycles and scooters and has over 30,000 employees across India. It is headquartered in New Delhi and had revenues of $2.8 billion in 2021.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Computer memory
1. Computer memory
From Wikipedia, the free encyclopedia
It has been suggested that Computer data storage be merged into this article or
section. (Discuss) Proposed since May 2012.
Computer memory types
Semiconductor memory
Volatile
RAM
DRAM (e.g., DDR SDRAM)
SRAM
In development
T-RAM
Z-RAM
TTRAM
Historical
Williams-Kilburn tube (1946-47)
Delay line memory (1947)
Selectron tube (1953)
Non-volatile
ROM
Mask ROM
PROM
EPROM
EEPROM
NVRAM
Flash memory
Early stage NVRAM
nvSRAM
FeRAM
MRAM
PRAM
2. In development
CBRAM
SONOS
RRAM
Racetrack memory
NRAM
Millipede memory
Historical
Drum memory (1932)
Magnetic-core memory (1949)
Plated wire memory (1957)
Thin-film memory (1962)
Twistor memory (~1968)
Bubble memory (~1970)
V
T
E
This article includes a list of references, related reading or external links, but its sources
remain unclear because it lacks inline citations. Please improve this article by introducing
more precise citations. (June 2011)
In computing, memory refers to the physical devices used to store programs (sequences of
instructions) or data (e.g. program state information) on a temporary or permanent basis for use in
a computer or other digital electronic device. The term primary memory is used for the information in
physical systems which are fast (i.e. RAM), as a distinction from secondary memory, which are
physical devices for program and data storage which are slow to access but offer higher memory
capacity. Primary memory stored on secondary memory is called "virtual memory".
The term "storage" is often (but not always) used in separate computers of traditional secondary
memory such as tape, magnetic disks and optical discs (CD-ROM and DVD-ROM). The term
"memory" is often (but not always) associated with addressablesemiconductor memory, i.e. integrated
circuits consisting of silicon-based transistors, used for example as primary memory but also other
purposes in computers and other digital electronic devices.
There are two main types of semiconductor memory: volatile and non-volatile. Examples of non-
volatile memory are flash memory(sometimes used as secondary, sometimes primary computer
memory) and ROM/PROM/EPROM/EEPROM memory (used for firmwaresuch as boot programs).
3. Examples of volatile memory are primary memory (typically dynamic RAM, DRAM), and fast CPU
cachememory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower
memory capacity per area unit than DRAM) .
The semiconductor memory is organized into memory cells or bistable flip-flops, each storing one
binary bit (0 or 1). The memory cells are grouped into words of fix word length, for example 1, 2, 4, 8,
16, 32, 64 or 128 bit. Each word can be accessed by a binary address of N bit, making it possible to
store 2 raised by N words in the memory. This implies that processor registers normally are not
considered as memory, since they only store one word and do not include an addressing mechanism.
Contents
[hide]
1 History
2 Volatile memory
3 Non-volatile memory
4 Management of memory
o 4.1 Memory management bugs
o 4.2 Early computer systems
o 4.3 Virtual memory
o 4.4 Protected memory
5 See also
6 References
7 External links
[edit]History
Detail of the back of a section of ENIAC, showing vacuum tubes
In the early 1940s, memory technology mostly permitted a capacity of a few bytes. The first electronic
programmable digital computer, the ENIAC, using thousands of octal-base radiovacuum tubes, could
4. perform simple calculations involving 20 numbers of ten decimal digits which were held in the vacuum
tube accumulators.
The next significant advance in computer memory was with acoustic delay line memorydeveloped
by J. Presper Eckert in the early 1940s. Through the construction of a glass tube filled
with mercury and plugged at each end with a quartz crystal, delay lines could store bits of information
within the quartz and transfer it through sound waves propagating through mercury. Delay line
memory would be limited to a capacity of up to a few hundred thousand bits to remain efficient.
Two alternatives to the delay line, the Williams tube and Selectron tube, were developed in 1946, both
using electron beams in glass tubes as means of storage. Using cathode ray tubes, Fred Williams
would invent the Williams tube, which would be the first random access computer memory. The
Williams tube would prove to be advantageous to the Selectron tube because of its greater capacity
(the Selectron was limited to 256 bits, while the Williams tube could store thousands) and being less
expensive. The Williams tube would nevertheless prove to be frustratingly sensitive to environmental
disturbances.
Efforts began in the late 1940s to find non-volatile memory. Jay Forrester, Jan A. Rajchman and An
Wang would be credited with the development of magnetic core memory, which would allow for recall
of memory after power loss. Magnetic core memory would become the dominant form of memory until
the development of transistor based memory in the late 1960s.
The term "memory" when used to reference computers will always be referring to Random Access
Memory or RAM.
[edit]Volatile memory
Volatile memory is computer memory that requires power to maintain the stored information. Most
modern semiconductor volatile memory is either Static RAM (see SRAM) or dynamic RAM
(see DRAM). SRAM retains its contents as long as the power is connected and is easy to interface to
but uses six transistors per bit. Dynamic RAM is more complicated to interface to and control and
needs regular refresh cycles to prevent its contents being lost. However, DRAM uses only one
transistor and a capacitor per bit, allowing it to reach much higher densities and, with more bits on a
memory chip, be much cheaper per bit. SRAM is not worthwhile for desktop system memory, where
DRAM dominates, but is used for their cache memories. SRAM is commonplace in small embedded
systems, which might only need tens of kilobytes or less. Forthcoming volatile memory technologies
that hope to replace or compete with SRAM and DRAM include Z-RAM, TTRAM, A-RAM and ETA
RAM.
[edit]Non-volatile memory
Non-volatile memory is computer memory that can retain the stored information even when not
powered. Examples of non-volatile memory include read-only memory (seeROM), flash memory, most
5. types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape), optical
discs, and early computer storage methods such as paper tape and punched cards. Forthcoming non-
volatile memory technologies include FeRAM, CBRAM, PRAM, SONOS, RRAM, Racetrack
memory, NRAM andMillipede.
[edit]Management of memory
It has been suggested that this article or section be merged into Memory management.
(Discuss) Proposed since February 2011.
Main article: Memory management
Proper management of memory is vital for a computer system to operate properly. Modern operating
systems have complex systems to properly manage memory. Failure to do so can lead to bugs, slow
performance, and at worst case, takeover by viruses and malicious software.
Nearly everything a computer programmer does requires him or her to consider how to manage
memory. Even storing a number in memory requires the programmer to specify how the memory
should store it.
[edit]Memory management bugs
Improper management of memory is a common cause of bugs.
In arithmetic overflow, a calculation results in a number larger than
the allocated memory permits. For example, an 8-bit integer allows
the numbers −128 to +127. If its value is 127 and it is instructed to
add one, the computer can not store the number 128 in that space.
Such a case will result in undesired operation, such as changing
the number's value to −127 instead of +128.
A memory leak occurs when a program requests memory from the
operating system and never returns the memory when it's done with
it. A program with this bug will gradually require more and more
memory until the program fails as it runs out.
A segmentation fault results when a program tries to access
memory that it has no permission to access. Generally a program
doing so will be terminated by the operating system.
Buffer overflow means that a program writes data to the end of its
allocated space and then continues to write data to memory that
belongs to other programs. This may result in erratic program
behavior, including memory access errors, incorrect results, a
6. crash, or a breach of system security. They are thus the basis of
many software vulnerabilities and can be maliciously exploited.
[edit]Early computer systems
In early computer systems, programs typically specified the location to write memory and what data to
put there. This location was a physical location on the actual memory hardware. The slow processing
of such computers did not allow for the complex memory management systems used today. Also, as
most such systems were single-task, sophisticated systems were not required as much.
This approach has its pitfalls. If the location specified is incorrect, this will cause the computer to write
the data to some other part of the program. The results of an error like this are unpredictable. In some
cases, the incorrect data might overwrite memory used by the operating system. Computer crackers
can take advantage of this to create viruses and malware.
[edit]Virtual memory
Main article: virtual memory
Virtual memory is a system where all physical memory is controlled by the operating system. When a
program needs memory, it requests it from the operating system. The operating system then decides
what physical location to place the memory in.
This offers several advantages. Computer programmers no longer need to worry about where the
memory is physically stored or whether the user's computer will have enough memory. It also allows
multiple types of memory to be used. For example, some memory can be stored in physical RAM
chips while other memory is stored on a hard drive. This drastically increases the amount of memory
available to programs. The operating system will place actively used memory in physical RAM, which
is much faster than hard disks. When the amount of RAM is not sufficient to run all the current
programs, it can result in a situation where the computer spends more time moving memory from
RAM to disk and back than it does accomplishing tasks; this is known as thrashing.
Virtual memory systems usually include protected memory, but this is not always the case.
[edit]Protected memory
Main article: memory protection
Protected memory is a system where each program is given an area of memory to use and is not
permitted to go outside that range. Use of protected memory greatly enhances both the reliability and
security of a computer system.
Without protected memory, it is possible that a bug in one program will alter the memory used by
another program. This will cause that other program to run off of corrupted memory with unpredictable
results. If the operating system's memory is corrupted, the entire computer system may crash and
need to be rebooted. At times programs intentionally alter the memory used by other programs. This
is done by viruses and malware to take over computers.
7. Protected memory assigns programs their own areas of memory. If the operating system detects that
a program has tried to alter memory that does not belong to it, the program is terminated. This way,
only the offending program crashes, and other programs are not affected by the error.
Protected memory systems almost always include virtual memory as well.
[edit]See also
Virtual memory
Semiconductor memory
Memory Geometry
[edit]References
Miller, Stephen W. (1977), Memory and Storage Technology,
Montvale.: AFIPS Press
Memory and Storage Technology, Alexandria, Virginia.: Time Life
Books, 1988
[edit]External links
http://computer.howstuffworks.com/computer-memory.htm
http://www.kingston.com/tools/umg/pdf/umg.pdf
View page ratings
Rate this page
What's this?
Trustworthy
Objective
Complete
Well-written
I am highly knowledgeable about this topic (optional)
Submit ratings
Categories:
Computer memory
Computer storage
Create account
Log in
Article
Talk
8. Read
Edit
View history
Main page
Contents
Featured content
Current events
Random article
Donate to Wikipedia
Interaction
Help
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
Toolbox
Print/export
Languages
বাাংলা
وردی ک
हिन्दी
Latina
Română
සිංහල
中文
This page was last modified on 13 July 2012 at 04:41.
Text is available under the Creative Commons Attribution-ShareAlike License;
additional terms may apply. See Terms of use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-
profit organization.
Contact us
Privacy policy
About Wikipedia
Disclaimers
Mobile view