SlideShare a Scribd company logo
COMPUTER
MEMORY
PRESENTATION BY
NIKUNJ PATEL
HISTORY
OF
MEMORY
HISTORY OF MEMORY
 In the early 1940s, memory technology mostly
permitted a capacity of a few bytes.
 ENIAC(Electronic Numerical Integrator And
Computer): Firs electronic general-
purpose computer .
 That is capable of being reprogrammed to
solve a large class of numerical problems.
DELAY
LINE
MEMORY
DELAY LINE MEMORY
 developed by J. Presper Eckert in the early
1940s.
 It is also used in digital computers.
 Delay line memory would be limited to a
capacity of up to a few hundred thousand bits to
remain efficient.
RANDOM ACCESS
COMPUTER MEMORY
RANDOM ACCESS
COMPUTER MEMORY
 The Williams tube and Selectron tube originated
in 1946.
 In 1947  Jay Forrester, Jan A. Rajchman and An
Wang developed magnetic core memory which
allowed for recall of memory after power loss.
 The Selectron was limited to 256 bits, while the
Williams tube could store thousands
RANDOM ACCESS
COMPUTER MEMORY
MAGNETIC
CORE
MEMORY
MAGNETIC CORE MEMORY
 It was the
computer
memory of
choice
throughout the
1960s, until it
was replaced
by
semiconductor
memory.
MEMORY
MEMORY
 It holds the data and instructions that the
Central Processing Unit (CPU) needs.
 Before a program can be run the program is
loaded from the storage medium into memory.
 It allows the CPU to direct interact with the
program.
 Memory is a need of every computer
TYPES OF MEMORY
TYPES OF MEMORY
 ROM (Read Only Memory)
 RAM (Random Access Memory)
 Cache memory
 Flash memory
READ ONLY MEMORY
 stores data
without electrical
current; it is the ROM
(Read Only Memory)
 or is sometimes
called non-volatile
memory as it is not
erased when the
system is switched off
RAM
 Random Access Memory, can be accessed
randomly. Any byte of memory can be accessed
without touching the preceding bytes. RAM is the
most common type of memory found in computers
and other devices, such as printers.
DDR2 RAM & DDR3 RAM
TYPES
OF
RAM
TYPES OF RAM
 There are two different types of RAM:
DRAM (Dynamic Random Access
Memory)
SRAM (Static Random Access
Memory).
DRAM
 Needs to be refreshed thousands of times per
second while.
 Dynamic RAM needs to automatically refresh
thousands of times per second; that's where it gets
the name dynamic. Otherwise, it will forget the
information it's holding.
SRAM
 Does not
need to be
refreshed, which is
what makes it
faster than DRAM.
 Both types of
RAM are volatile,
meaning that
they lose their
contents when
the power is
turned off.
CACHE MEMORY
CACHE MEMORY
 The cache is
a smaller, faster
memory which
stores copies of
the data from
frequently
used main
memory locatio
ns.
FLASH MEMORY
FLASH MEMORY
 Non volatile memory can be erased
electronically and rewritten similar to EEPROM.
 Introduced by Toshiba in 1984.
 Most computers use it to hold up their startup
instructions.
 Also used in many mobiles , smart phones ,
digital cameras and PDA.
FLASH MEMORY
THANK
YOU

More Related Content

What's hot

Ram & rom
Ram & romRam & rom
Ram & rom
Ahsan Rafiq
 
Memory
MemoryMemory
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
Rizwan Qamar
 
computer memory and memory module
computer memory and memory modulecomputer memory and memory module
computer memory and memory module
thensi
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
Angel Mary George
 
ROM (Read Only Memory)
ROM (Read Only Memory)ROM (Read Only Memory)
ROM (Read Only Memory)
JaneAlamAdnan
 
Storage devices
Storage devicesStorage devices
Basic of computer
Basic of computerBasic of computer
Basic of computer
Tukaram Gundoor
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
Forrester High School
 
Chapter 5
Chapter 5Chapter 5
Chapter 5askme
 
RAM(Random Access Memory)
RAM(Random Access Memory)RAM(Random Access Memory)
RAM(Random Access Memory)
JaneAlamAdnan
 
Hard Disk Drive
Hard Disk DriveHard Disk Drive
Hard Disk Drive
Tristan Marcellana
 
Memory module
Memory moduleMemory module
Memory modulelemar12
 
Types of memory in Computer
Types of memory in ComputerTypes of memory in Computer
Types of memory in Computer
Fazle Rabbi Ador
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER Rajat More
 
Power point presentation on memory of computer
Power point presentation on memory of computerPower point presentation on memory of computer
Power point presentation on memory of computer
Arpita Banerjee
 
Storage devices
Storage devicesStorage devices
Storage devices
rabail asghar
 

What's hot (20)

Ram & rom
Ram & romRam & rom
Ram & rom
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Memory
MemoryMemory
Memory
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
 
computer memory and memory module
computer memory and memory modulecomputer memory and memory module
computer memory and memory module
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
ROM (Read Only Memory)
ROM (Read Only Memory)ROM (Read Only Memory)
ROM (Read Only Memory)
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Computer storage
Computer storageComputer storage
Computer storage
 
Memory types
Memory typesMemory types
Memory types
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
RAM(Random Access Memory)
RAM(Random Access Memory)RAM(Random Access Memory)
RAM(Random Access Memory)
 
Hard Disk Drive
Hard Disk DriveHard Disk Drive
Hard Disk Drive
 
Memory module
Memory moduleMemory module
Memory module
 
Types of memory in Computer
Types of memory in ComputerTypes of memory in Computer
Types of memory in Computer
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
 
Power point presentation on memory of computer
Power point presentation on memory of computerPower point presentation on memory of computer
Power point presentation on memory of computer
 
Storage devices
Storage devicesStorage devices
Storage devices
 

Similar to Computer memory

RAM :A primary Memory
RAM :A primary MemoryRAM :A primary Memory
RAM :A primary Memory
Dev Dorse
 
Primary memory (main memory)
Primary memory (main memory)Primary memory (main memory)
Primary memory (main memory)
shah baadshah
 
RANDOM ACCEES MEMORY
RANDOM ACCEES MEMORYRANDOM ACCEES MEMORY
RANDOM ACCEES MEMORYMaya Singh
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
Masum Rehman
 
Memory System
Memory SystemMemory System
Memory System
ImranulHasan6
 
Memory - RAM and its types
Memory - RAM and its typesMemory - RAM and its types
Memory - RAM and its types
Abhay Matthew
 
Computer memory
Computer memoryComputer memory
Computer memory
Ambuj Rai
 
Random access memory
Random access memoryRandom access memory
Random access memory
BESOR ACADEMY
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
ChuuHye
 
Ram & rom memories
Ram & rom memoriesRam & rom memories
Ram & rom memoriesangelaag98
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
presentation on memory units.
presentation on memory units.presentation on memory units.
presentation on memory units.
Krishna Bharati
 
Topic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxTopic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptx
MartMantilla1
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
Gihan Chanaka
 
Ram ppt
Ram pptRam ppt
TYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESTYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIES
Shahbaz Baloch
 

Similar to Computer memory (20)

Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
RAM :A primary Memory
RAM :A primary MemoryRAM :A primary Memory
RAM :A primary Memory
 
Primary memory (main memory)
Primary memory (main memory)Primary memory (main memory)
Primary memory (main memory)
 
RANDOM ACCEES MEMORY
RANDOM ACCEES MEMORYRANDOM ACCEES MEMORY
RANDOM ACCEES MEMORY
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
shikhar
shikharshikhar
shikhar
 
Memory System
Memory SystemMemory System
Memory System
 
Memory - RAM and its types
Memory - RAM and its typesMemory - RAM and its types
Memory - RAM and its types
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
 
Ram & rom memories
Ram & rom memoriesRam & rom memories
Ram & rom memories
 
Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Random Access Memory ppt
 
presentation on memory units.
presentation on memory units.presentation on memory units.
presentation on memory units.
 
Topic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxTopic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptx
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
 
Ram ppt
Ram pptRam ppt
Ram ppt
 
TYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESTYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIES
 
Dram and its types
Dram and its typesDram and its types
Dram and its types
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Computer memory

  • 3. HISTORY OF MEMORY  In the early 1940s, memory technology mostly permitted a capacity of a few bytes.  ENIAC(Electronic Numerical Integrator And Computer): Firs electronic general- purpose computer .  That is capable of being reprogrammed to solve a large class of numerical problems.
  • 5. DELAY LINE MEMORY  developed by J. Presper Eckert in the early 1940s.  It is also used in digital computers.  Delay line memory would be limited to a capacity of up to a few hundred thousand bits to remain efficient.
  • 7. RANDOM ACCESS COMPUTER MEMORY  The Williams tube and Selectron tube originated in 1946.  In 1947  Jay Forrester, Jan A. Rajchman and An Wang developed magnetic core memory which allowed for recall of memory after power loss.  The Selectron was limited to 256 bits, while the Williams tube could store thousands
  • 10. MAGNETIC CORE MEMORY  It was the computer memory of choice throughout the 1960s, until it was replaced by semiconductor memory.
  • 12. MEMORY  It holds the data and instructions that the Central Processing Unit (CPU) needs.  Before a program can be run the program is loaded from the storage medium into memory.  It allows the CPU to direct interact with the program.  Memory is a need of every computer
  • 14. TYPES OF MEMORY  ROM (Read Only Memory)  RAM (Random Access Memory)  Cache memory  Flash memory
  • 15. READ ONLY MEMORY  stores data without electrical current; it is the ROM (Read Only Memory)  or is sometimes called non-volatile memory as it is not erased when the system is switched off
  • 16. RAM  Random Access Memory, can be accessed randomly. Any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.
  • 17. DDR2 RAM & DDR3 RAM
  • 19. TYPES OF RAM  There are two different types of RAM: DRAM (Dynamic Random Access Memory) SRAM (Static Random Access Memory).
  • 20. DRAM  Needs to be refreshed thousands of times per second while.  Dynamic RAM needs to automatically refresh thousands of times per second; that's where it gets the name dynamic. Otherwise, it will forget the information it's holding.
  • 21. SRAM  Does not need to be refreshed, which is what makes it faster than DRAM.  Both types of RAM are volatile, meaning that they lose their contents when the power is turned off.
  • 23. CACHE MEMORY  The cache is a smaller, faster memory which stores copies of the data from frequently used main memory locatio ns.
  • 25. FLASH MEMORY  Non volatile memory can be erased electronically and rewritten similar to EEPROM.  Introduced by Toshiba in 1984.  Most computers use it to hold up their startup instructions.  Also used in many mobiles , smart phones , digital cameras and PDA.