SlideShare a Scribd company logo
Memory Devices
Definition-
In order for data to be processed by a computer,
they must first be stored in main computer
storage. Over the years, different memory
devices have been used to store data (as 1s and
0s) in main computer storage. In order to achieve
this memory devices were introduced.
Memory devices are of 2 types-
1. Primary storage
2.Secondary storage
1. Random Access Memory (RAM)-
Primary storage
 Random Access Memory (RAM) is used when program
instructions or data are temporarily stored in the computer
before and after they are processed. RAM is also called primary
storage or main computer storage. RAM is very important to
computer systems. When the computer starts, the operating
system is loaded from storage into RAM, and when the user
opens an application software package, the instructions for it
are also loaded into RAM. As someone uses that software to
write a letter to his mother, for example, the characters he
types are held in RAM until he tells the software to perform
some action such as print the document. Having enough RAM is
important since it affects how quickly the user can perform
certain tasks. In some cases, the user will not be able to use
certain software programs if he does not have enough RAM.
 Random Access Memory can be static or dynamic . In static
random-access memory (SRAM), a small current is used to
maintain the stored data values without further manipulation
while the power is on.
2. Read-Only Memory (ROM)-
 ROM, or read-only memory, is a type of semiconductor memory
that is permanent and cannot be erased. The Central Processing
Unit (CPU) can read data stored in ROM, but cannot write to
ROM. With ROM, the data are recorded when the memory is
manufactured. The data are activated when the computer is
turned on. ROM is normally used to store data and programs, such
as language interpreters (BASIC), display controllers, or the
storage of manufacturer-specific micro codes such as Basic Input
Output System (BIOS). Unlike RAM, ROM is not volatile.
 In the early 1950s, Jay W. Forrester
and his group at Massachusetts
Institute of Technology (MIT)
developed magnetic core storage,
which replaced vacuum tubes and was
the most popular device for storing
data in main computer storage for
two decades.
 Tiny donuts made of magnetic
material strung on wires into an
array: the idea revolutionized
computer memory. Each donut was a
bit, magnetized one way for “zero,”
and the other way for “one.” The
wires could both detect and change
the magnetization. In 1953, MIT’s
Whirlwind became the first computer
to use this technology.
3. Magnetic-core memory-
Jay W. Forrester
 Secondary memory (or secondary storage) is the slowest
and cheapest form of memory. It cannot be processed
directly by the CPU. It must first be copied into primary
storage (also known as RAM ).
 Secondary memory devices include magnetic disks like hard
drives and floppy disks ; optical disks such
as CDs and CDROMs ; and magnetic tapes, which were the
first forms of secondary memory.
Secondary memory-
1. USB flash drive-
 A pen drive is a portable Universal Serial Bus (USB) flash
memory device for storing and transferring audio, video, and
data files from a computer. As long as the desktop or laptop
has a USB port, and the pen drive is compatible with the
operating system, it should be easy to move the data from
the hard drive to the device — and to another computer — in a
matter of minutes. The drive gets its name from the fact that
many have a retractable port connector like a ballpoint pen, and
they are small enough to fit into a pocket. Other names include
flash drive, jump drive, and thumb drive.
2. External Hard disk-
 One major advantage of an external hard disk is you can send your
downloaded files directly to it which significantly reduces the
chance of a virus getting onto your main hard disk. Your computer
or laptop may be shared between family members or friends
meaning that you want to keep your private files private. With an
external hard disk you can take the files with you anywhere you
wish and lock them away.
 Most external hard disk disks are conveniently sized and you
simply plug them in via a USB port to start using them. They are
protected with a solid plastic case which also contains a fan to
keep the drive itself cool and regulate the temperature. You can
also get hold of external disks that use fire wire technology but
USB is much more common.
3. Optical disks-
 Alternatively referred to as optical media and optical storage, an optical
disc drive (ODD) or optical disk is any storage media that holds content in
digital format and is read using a laser assembly is considered optical
media. The most common types of optical media are Blu-ray, CDs,
and DVDs. Computers can read and write to CDs and DVDs using a CD
Writer or DVD Writer drive, and a Blu-ray is read with a Blu-ray drive.
 There are three main types of optical media: CD, DVD, and Blu-ray disc.
CDs can store up to 700 megabytes (MB) of data and DVDs can store up to
8.4 GB of data. Blu-ray discs, which are the newest type of optical media,
can store up to 50 GB of data. This storage capacity is a clear advantage
over the floppy disk storage media (a magnetic media), which only has a
capacity of 1.44 MB. Another advantage that optical media have over the
floppy disk is that it can last up to 7 times longer, due to its improved
durability.
4. Memory cards-
 A memory card or flash card is an electronic flash
memory data storage device used for storing digital
information. They are commonly used in many
electronic devices, including digital cameras, mobile
phones , laptop computers, MP3 players and video
game consoles. Most of these can be diminutive, re-
recordable, and can retain data without power
Online storage services-
 They usually use a virtual drive that exists on your
desktop in some manner, and it is linked directly to your
online storage space. The contents of this virtual hard
drive remain in sync across all of the desktops,
notebooks and mobile devices on which you have
installed the client software.
 You designate which files or folders that you want to be
part of the virtual drive; everything on that drive is
then automatically uploaded to an online server. From
there it is accessible (by logging on with a username and
a password) from your other devices, either from
another installed version of the application, or via a web
interface. And you can grant other people access.
Some common online memory
storage devices-
 DriveHQ File Manager
 Dropbox
 OpenDrive
 SpideOak
 ZumoDrive
Thank You
Efforts By-
Satyam Sharma
XI-F
Batch -2014-2015

More Related Content

What's hot

Power point presentation on memory of computer
Power point presentation on memory of computerPower point presentation on memory of computer
Power point presentation on memory of computer
Arpita Banerjee
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
Md. Rafid Abrar Miah
 
Ram & rom
Ram & romRam & rom
Ram & rom
Ahsan Rafiq
 
ROM(Read Only Memory )
ROM(Read Only Memory )ROM(Read Only Memory )
ROM(Read Only Memory )
rohitladdu
 
ROM (Read Only Memory)
ROM (Read Only Memory)ROM (Read Only Memory)
ROM (Read Only Memory)
JaneAlamAdnan
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
Freelancer
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
Abhinav Kp
 
Types of Storage Devices
Types of Storage DevicesTypes of Storage Devices
Types of Storage Devices
Kabarak University
 
Memory units
Memory unitsMemory units
Memory units
Vanitha Kumari
 
Ram and its types
Ram and its typesRam and its types
Ram and its types
FARAZ QURESHI(BLACK HAT)
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Storage device
Storage deviceStorage device
Storage device
Tejas Moka
 
Hard Disk
Hard DiskHard Disk
Hard Disk
Danial Mirza
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
Gihan Chanaka
 
Basic components of computer system
Basic components  of computer systemBasic components  of computer system
Basic components of computer system
TECHNOHABIT
 
Primary memory (main memory)
Primary memory (main memory)Primary memory (main memory)
Primary memory (main memory)
shah baadshah
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
George Ranson
 
Types of rom
Types of romTypes of rom
Types of rom
alldesign
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
aaravSingh41
 

What's hot (20)

Power point presentation on memory of computer
Power point presentation on memory of computerPower point presentation on memory of computer
Power point presentation on memory of computer
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Secondary Storage
Secondary StorageSecondary Storage
Secondary Storage
 
Ram & rom
Ram & romRam & rom
Ram & rom
 
ROM(Read Only Memory )
ROM(Read Only Memory )ROM(Read Only Memory )
ROM(Read Only Memory )
 
ROM (Read Only Memory)
ROM (Read Only Memory)ROM (Read Only Memory)
ROM (Read Only Memory)
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
Types of Storage Devices
Types of Storage DevicesTypes of Storage Devices
Types of Storage Devices
 
Memory units
Memory unitsMemory units
Memory units
 
Ram and its types
Ram and its typesRam and its types
Ram and its types
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Random Access Memory ppt
 
Storage device
Storage deviceStorage device
Storage device
 
Hard Disk
Hard DiskHard Disk
Hard Disk
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
 
Basic components of computer system
Basic components  of computer systemBasic components  of computer system
Basic components of computer system
 
Primary memory (main memory)
Primary memory (main memory)Primary memory (main memory)
Primary memory (main memory)
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Types of rom
Types of romTypes of rom
Types of rom
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 

Similar to Memory devices

Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
Swarnima Tiwari
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devisesdevaki123
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
Mirza Ćutuk
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
Tabsheer Hasan
 
Soumenu Patra Presentation_Types of Memory.pdf
Soumenu Patra Presentation_Types of Memory.pdfSoumenu Patra Presentation_Types of Memory.pdf
Soumenu Patra Presentation_Types of Memory.pdf
SoumenduPatra3
 
storage devices.pdf
storage devices.pdfstorage devices.pdf
storage devices.pdf
Fajar Iqbal
 
secondry storage ahsan warraich
secondry storage ahsan warraichsecondry storage ahsan warraich
secondry storage ahsan warraich
ahsaniftikhar19
 
Presentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptxPresentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptx
Uttamkumar471388
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
Dr. Mazin Mohamed alkathiri
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
Raj vardhan
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
SriShailam5
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
julitolosbanos
 
PERFORM CALCULATION AND MENSURATION.pptx
PERFORM CALCULATION AND MENSURATION.pptxPERFORM CALCULATION AND MENSURATION.pptx
PERFORM CALCULATION AND MENSURATION.pptx
EchelleOgatis
 
1f Backup
1f   Backup1f   Backup
1f BackupMISY
 
FTCP-Computer-Memory..pdf
FTCP-Computer-Memory..pdfFTCP-Computer-Memory..pdf
FTCP-Computer-Memory..pdf
skilltechITI
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its application
ABUL HASAN
 
ComputerMemory.pdf
ComputerMemory.pdfComputerMemory.pdf
ComputerMemory.pdf
ARTUROGOMEZGARCIA2
 

Similar to Memory devices (20)

Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devises
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
 
Soumenu Patra Presentation_Types of Memory.pdf
Soumenu Patra Presentation_Types of Memory.pdfSoumenu Patra Presentation_Types of Memory.pdf
Soumenu Patra Presentation_Types of Memory.pdf
 
storage devices.pdf
storage devices.pdfstorage devices.pdf
storage devices.pdf
 
secondry storage ahsan warraich
secondry storage ahsan warraichsecondry storage ahsan warraich
secondry storage ahsan warraich
 
Presentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptxPresentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptx
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
 
PERFORM CALCULATION AND MENSURATION.pptx
PERFORM CALCULATION AND MENSURATION.pptxPERFORM CALCULATION AND MENSURATION.pptx
PERFORM CALCULATION AND MENSURATION.pptx
 
1f Backup
1f   Backup1f   Backup
1f Backup
 
FTCP-Computer-Memory..pdf
FTCP-Computer-Memory..pdfFTCP-Computer-Memory..pdf
FTCP-Computer-Memory..pdf
 
Storing data
Storing dataStoring data
Storing data
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its application
 
Storage
StorageStorage
Storage
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
 
ComputerMemory.pdf
ComputerMemory.pdfComputerMemory.pdf
ComputerMemory.pdf
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Memory devices

  • 2. Definition- In order for data to be processed by a computer, they must first be stored in main computer storage. Over the years, different memory devices have been used to store data (as 1s and 0s) in main computer storage. In order to achieve this memory devices were introduced. Memory devices are of 2 types- 1. Primary storage 2.Secondary storage
  • 3. 1. Random Access Memory (RAM)- Primary storage  Random Access Memory (RAM) is used when program instructions or data are temporarily stored in the computer before and after they are processed. RAM is also called primary storage or main computer storage. RAM is very important to computer systems. When the computer starts, the operating system is loaded from storage into RAM, and when the user opens an application software package, the instructions for it are also loaded into RAM. As someone uses that software to write a letter to his mother, for example, the characters he types are held in RAM until he tells the software to perform some action such as print the document. Having enough RAM is important since it affects how quickly the user can perform certain tasks. In some cases, the user will not be able to use certain software programs if he does not have enough RAM.  Random Access Memory can be static or dynamic . In static random-access memory (SRAM), a small current is used to maintain the stored data values without further manipulation while the power is on.
  • 4. 2. Read-Only Memory (ROM)-  ROM, or read-only memory, is a type of semiconductor memory that is permanent and cannot be erased. The Central Processing Unit (CPU) can read data stored in ROM, but cannot write to ROM. With ROM, the data are recorded when the memory is manufactured. The data are activated when the computer is turned on. ROM is normally used to store data and programs, such as language interpreters (BASIC), display controllers, or the storage of manufacturer-specific micro codes such as Basic Input Output System (BIOS). Unlike RAM, ROM is not volatile.
  • 5.  In the early 1950s, Jay W. Forrester and his group at Massachusetts Institute of Technology (MIT) developed magnetic core storage, which replaced vacuum tubes and was the most popular device for storing data in main computer storage for two decades.  Tiny donuts made of magnetic material strung on wires into an array: the idea revolutionized computer memory. Each donut was a bit, magnetized one way for “zero,” and the other way for “one.” The wires could both detect and change the magnetization. In 1953, MIT’s Whirlwind became the first computer to use this technology. 3. Magnetic-core memory- Jay W. Forrester
  • 6.  Secondary memory (or secondary storage) is the slowest and cheapest form of memory. It cannot be processed directly by the CPU. It must first be copied into primary storage (also known as RAM ).  Secondary memory devices include magnetic disks like hard drives and floppy disks ; optical disks such as CDs and CDROMs ; and magnetic tapes, which were the first forms of secondary memory. Secondary memory-
  • 7. 1. USB flash drive-  A pen drive is a portable Universal Serial Bus (USB) flash memory device for storing and transferring audio, video, and data files from a computer. As long as the desktop or laptop has a USB port, and the pen drive is compatible with the operating system, it should be easy to move the data from the hard drive to the device — and to another computer — in a matter of minutes. The drive gets its name from the fact that many have a retractable port connector like a ballpoint pen, and they are small enough to fit into a pocket. Other names include flash drive, jump drive, and thumb drive.
  • 8. 2. External Hard disk-  One major advantage of an external hard disk is you can send your downloaded files directly to it which significantly reduces the chance of a virus getting onto your main hard disk. Your computer or laptop may be shared between family members or friends meaning that you want to keep your private files private. With an external hard disk you can take the files with you anywhere you wish and lock them away.  Most external hard disk disks are conveniently sized and you simply plug them in via a USB port to start using them. They are protected with a solid plastic case which also contains a fan to keep the drive itself cool and regulate the temperature. You can also get hold of external disks that use fire wire technology but USB is much more common.
  • 9. 3. Optical disks-  Alternatively referred to as optical media and optical storage, an optical disc drive (ODD) or optical disk is any storage media that holds content in digital format and is read using a laser assembly is considered optical media. The most common types of optical media are Blu-ray, CDs, and DVDs. Computers can read and write to CDs and DVDs using a CD Writer or DVD Writer drive, and a Blu-ray is read with a Blu-ray drive.  There are three main types of optical media: CD, DVD, and Blu-ray disc. CDs can store up to 700 megabytes (MB) of data and DVDs can store up to 8.4 GB of data. Blu-ray discs, which are the newest type of optical media, can store up to 50 GB of data. This storage capacity is a clear advantage over the floppy disk storage media (a magnetic media), which only has a capacity of 1.44 MB. Another advantage that optical media have over the floppy disk is that it can last up to 7 times longer, due to its improved durability.
  • 10. 4. Memory cards-  A memory card or flash card is an electronic flash memory data storage device used for storing digital information. They are commonly used in many electronic devices, including digital cameras, mobile phones , laptop computers, MP3 players and video game consoles. Most of these can be diminutive, re- recordable, and can retain data without power
  • 11. Online storage services-  They usually use a virtual drive that exists on your desktop in some manner, and it is linked directly to your online storage space. The contents of this virtual hard drive remain in sync across all of the desktops, notebooks and mobile devices on which you have installed the client software.  You designate which files or folders that you want to be part of the virtual drive; everything on that drive is then automatically uploaded to an online server. From there it is accessible (by logging on with a username and a password) from your other devices, either from another installed version of the application, or via a web interface. And you can grant other people access.
  • 12. Some common online memory storage devices-  DriveHQ File Manager  Dropbox  OpenDrive  SpideOak  ZumoDrive
  • 13. Thank You Efforts By- Satyam Sharma XI-F Batch -2014-2015