SlideShare a Scribd company logo
1 of 16
Random access
memory (RAM).
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Introducing RAM.
– Types of dynamic RAM.
– Special consideration of RAM.
Page 4
Random access memory.
Page 5
When most people talk
about computer memory,
they are talking about
dynamic random access
memory (DRAM).
DRAM is not the only type of memory that is
present, but it is the one that most people are
familiar with. DRAM is used to hold data and pass it
between the CPU and storage devices. We use
DRAM because it is quicker and more responsive
than using the storage device itself, and it can hold a
lot more data than the CPU.
Random access memory.
Page 6
– How it works.
» Uses transistors and capacitors to hold electrical
charges.
» Uses arrays of transistors (registers) to hold binary data.
» The registers are either on or off (binary 1 or 0).
» No electricity, no memory.
– Static RAM (SRAM).
» Located on the CPU die, or just off of it (commonly called
cache or cache memory).
» Super fast.
» Expensive.
– Dynamic RAM.
» Always located off the die.
» Fast, but not as fast as SRAM.
» Relatively inexpensive.
Random access memory.
Page 7
Random access memory.
Page 8
The dual inline memory
module (DIMM) is both
obsolete and cutting edge.
Before the introduction of the DIMM, memory
modules could only receive current through one side
of their electrical contacts. This limited the memory
bus to only being 32 bits wide. The DIMM could
receive electrical current through both sides of the
contact and the memory bus grew to 64 bits wide.
All current RAM are a type of DIMM.
Random access memory.
Page 9
– Synchronous dynamic RAM (SDRAM).
» True beginning of modern RAM (industry standard
beginning in 1993).
» Synchronized with the system clock and could perform
an operation with every cycle of the clock.
» Currently considered obsolete.
– Double data rate (DDR) RAM.
» Introduced in 1996.
» Effectively doubled the possible rate of data transfer by
taking advantage of the rising and falling edges of the
clock cycle (two operations per cycle).
» Speed of the RAM is determined by a specific formula:
clock rate X 2 X 64 /8 = MB transfer rate.
Random access memory.
Page 10
– Rambus DRAM (RDRAM).
» A proprietary standard developed by Rambus, Inc. that
was initially supported by Intel.
» Had to either be installed in pairs, or it had to use a
special device called a continuity module (also called a
RIMM) in order to function.
» Not as cost effective as DDR.
– DDR2 and DDR3.
» DDR2 doubled DDR’s performance = clock rate X 4 X 64
/8.
» DDR3 doubled DDR2’s performance = clock rate X 8 X
64 /8.
– Small outline dual inline memory
module (SODIMM).
» Compact memory modules that are used in small form
factor computers (laptops in most cases).
» They can be DDR, DDR2, DDR3, etc.
Random access memory.
Page 11
– Parity vs. non-parity RAM.
» Parity RAM modules have an extra bit (a parity bit) that is
used to check for errors in RAM. They can’t fix the error.
» More expensive than non-parity RAM and not really
needed anymore.
– Error-correcting code (ECC) vs.
non-ECC RAM.
» ECC RAM can detect and recover from (correct) errors in
memory.
» Much more expensive, but should be used in situations
where an error can’t be tolerated.
– Dual sided vs. single sided RAM.
» Dual sided RAM is when the memory modules on a stick
are separated in ranks; only one rank may be accessed
at a time.
» Single sided RAM is when the memory modules are not
separated into ranks; it is faster but more expensive than
dual sided RAM.
Random access memory.
Page 12
Random access memory.
Page 13
– Single channel vs. multi-channel RAM.
» Single channel: all banks (slots) of RAM share a single
64 bit bus to the CPU.
» Multi-channel RAM: the banks of RAM may be grouped
together to form a wider bus to the CPU (128 bit or 192
bit).
» To take advantage of the multi-channel capabilities, the
RAM must be installed in matched sets.
» Follow the motherboard documentation when installing
multi-channel RAM.
– Know what type of RAM your MB
supports.
» A motherboard will only support one type of RAM (DDR,
DDR2, DDRs); you can’t mix them together.
» The RAM modules are keyed on the bottom so that they
can’t be placed in the wrong type of RAM slots.
» You can install different speeds of RAM together, but the
RAM will only function at the speed of the slowest
module.
Random access memory.
Page 14
Random access memory.
Computer memory usually refers to dynamic random access memory.
SRAM is quicker but much more expensive.
Topic
Introducing RAM.
Summary
The DIMM is both ancient and new. All modern RAM is a type of DIMM.
Modern RAM started with SDRAM and is currently working through DDR3.
Parity RAM uses an extra bit to check for errors, but can’t recover from
(correct) those errors. ECC RAM can recover from (correct) memory errors
but is very expensive. Double sided RAM uses ranks; single sided doesn’t.
Types of RAM.
RAM may be used in single or multi-channel configurations, depending on
the motherboard. When used in a multi-channel situation, follow the
motherboard’s installation instructions. RAM may not be mixed and
matched between types, but it can be done by speed. When RAM speeds
don’t match, all RAM functions at the speed of the slowest.
Special considerations of
RAM.
Page 15
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot (7)

Pace IT - Display Devices
Pace IT - Display DevicesPace IT - Display Devices
Pace IT - Display Devices
 
Pace IT - Custom Configurations
Pace IT - Custom ConfigurationsPace IT - Custom Configurations
Pace IT - Custom Configurations
 
Pace IT - Common Laptop Components
Pace IT - Common Laptop ComponentsPace IT - Common Laptop Components
Pace IT - Common Laptop Components
 
PACE-IT: Operation System Features
PACE-IT: Operation System FeaturesPACE-IT: Operation System Features
PACE-IT: Operation System Features
 
Pace IT - Microsoft OS and Requirements
Pace IT - Microsoft OS and RequirementsPace IT - Microsoft OS and Requirements
Pace IT - Microsoft OS and Requirements
 
Faq Multiuser P Cstation
Faq Multiuser P CstationFaq Multiuser P Cstation
Faq Multiuser P Cstation
 
How to perform san disk photo recovery
How to perform san disk photo recoveryHow to perform san disk photo recovery
How to perform san disk photo recovery
 

Viewers also liked

Viewers also liked (8)

4 ram
4 ram4 ram
4 ram
 
Memory system
Memory systemMemory system
Memory system
 
11. Computer Systems Hardware 1
11. Computer Systems   Hardware 111. Computer Systems   Hardware 1
11. Computer Systems Hardware 1
 
Ram and its types
Ram and its typesRam and its types
Ram and its types
 
Ram & rom memories
Ram & rom memoriesRam & rom memories
Ram & rom memories
 
RAM and ROM Memory Overview
RAM and ROM Memory OverviewRAM and ROM Memory Overview
RAM and ROM Memory Overview
 
Introduction to Motherboard
Introduction to Motherboard Introduction to Motherboard
Introduction to Motherboard
 
Introduction to Computer Hardware Assembling
Introduction to Computer Hardware AssemblingIntroduction to Computer Hardware Assembling
Introduction to Computer Hardware Assembling
 

Similar to Pace IT - Introduction to Ram

Introduction of ram ddr3
Introduction of ram ddr3Introduction of ram ddr3
Introduction of ram ddr3Technocratz
 
Introduction of ram ddr3
Introduction of ram ddr3Introduction of ram ddr3
Introduction of ram ddr3Jatin Goyal
 
CBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer OrganizationCBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer OrganizationFaizSSIS
 
Random Access Memory (RAM)
Random Access Memory (RAM)Random Access Memory (RAM)
Random Access Memory (RAM)RemonShai
 
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDLIRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDLIRJET Journal
 
memory.pptx
memory.pptxmemory.pptx
memory.pptxgrendel3
 
Reliability and yield
Reliability and yield Reliability and yield
Reliability and yield rohitladdu
 
Random access memory
Random access memoryRandom access memory
Random access memoryBESOR ACADEMY
 
Basics Of Semiconductor Memories
Basics Of Semiconductor MemoriesBasics Of Semiconductor Memories
Basics Of Semiconductor MemoriesRahul Bandhe
 

Similar to Pace IT - Introduction to Ram (20)

Introduction of ram ddr3
Introduction of ram ddr3Introduction of ram ddr3
Introduction of ram ddr3
 
Introduction of ram ddr3
Introduction of ram ddr3Introduction of ram ddr3
Introduction of ram ddr3
 
Memory.pptx
Memory.pptxMemory.pptx
Memory.pptx
 
Module 1 unit 4
Module 1 unit 4Module 1 unit 4
Module 1 unit 4
 
CBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer OrganizationCBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer Organization
 
project on memories .pptx
project on memories .pptxproject on memories .pptx
project on memories .pptx
 
RAM slide
RAM slideRAM slide
RAM slide
 
Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02
 
Random Access Memory (RAM)
Random Access Memory (RAM)Random Access Memory (RAM)
Random Access Memory (RAM)
 
L010236974
L010236974L010236974
L010236974
 
Cmp
CmpCmp
Cmp
 
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDLIRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
IRJET- Design And VLSI Verification of DDR SDRAM Controller Using VHDL
 
Memory devices
Memory devicesMemory devices
Memory devices
 
memory.pptx
memory.pptxmemory.pptx
memory.pptx
 
Reliability and yield
Reliability and yield Reliability and yield
Reliability and yield
 
16CPHMP. PPT (1).pptx
16CPHMP. PPT (1).pptx16CPHMP. PPT (1).pptx
16CPHMP. PPT (1).pptx
 
Unit 1 OMT.pptx
Unit 1 OMT.pptxUnit 1 OMT.pptx
Unit 1 OMT.pptx
 
Random access memory
Random access memoryRandom access memory
Random access memory
 
Internal memory
Internal memoryInternal memory
Internal memory
 
Basics Of Semiconductor Memories
Basics Of Semiconductor MemoriesBasics Of Semiconductor Memories
Basics Of Semiconductor Memories
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Pace IT - Introduction to Ram

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Introducing RAM. – Types of dynamic RAM. – Special consideration of RAM.
  • 5. Page 5 When most people talk about computer memory, they are talking about dynamic random access memory (DRAM). DRAM is not the only type of memory that is present, but it is the one that most people are familiar with. DRAM is used to hold data and pass it between the CPU and storage devices. We use DRAM because it is quicker and more responsive than using the storage device itself, and it can hold a lot more data than the CPU. Random access memory.
  • 6. Page 6 – How it works. » Uses transistors and capacitors to hold electrical charges. » Uses arrays of transistors (registers) to hold binary data. » The registers are either on or off (binary 1 or 0). » No electricity, no memory. – Static RAM (SRAM). » Located on the CPU die, or just off of it (commonly called cache or cache memory). » Super fast. » Expensive. – Dynamic RAM. » Always located off the die. » Fast, but not as fast as SRAM. » Relatively inexpensive. Random access memory.
  • 8. Page 8 The dual inline memory module (DIMM) is both obsolete and cutting edge. Before the introduction of the DIMM, memory modules could only receive current through one side of their electrical contacts. This limited the memory bus to only being 32 bits wide. The DIMM could receive electrical current through both sides of the contact and the memory bus grew to 64 bits wide. All current RAM are a type of DIMM. Random access memory.
  • 9. Page 9 – Synchronous dynamic RAM (SDRAM). » True beginning of modern RAM (industry standard beginning in 1993). » Synchronized with the system clock and could perform an operation with every cycle of the clock. » Currently considered obsolete. – Double data rate (DDR) RAM. » Introduced in 1996. » Effectively doubled the possible rate of data transfer by taking advantage of the rising and falling edges of the clock cycle (two operations per cycle). » Speed of the RAM is determined by a specific formula: clock rate X 2 X 64 /8 = MB transfer rate. Random access memory.
  • 10. Page 10 – Rambus DRAM (RDRAM). » A proprietary standard developed by Rambus, Inc. that was initially supported by Intel. » Had to either be installed in pairs, or it had to use a special device called a continuity module (also called a RIMM) in order to function. » Not as cost effective as DDR. – DDR2 and DDR3. » DDR2 doubled DDR’s performance = clock rate X 4 X 64 /8. » DDR3 doubled DDR2’s performance = clock rate X 8 X 64 /8. – Small outline dual inline memory module (SODIMM). » Compact memory modules that are used in small form factor computers (laptops in most cases). » They can be DDR, DDR2, DDR3, etc. Random access memory.
  • 11. Page 11 – Parity vs. non-parity RAM. » Parity RAM modules have an extra bit (a parity bit) that is used to check for errors in RAM. They can’t fix the error. » More expensive than non-parity RAM and not really needed anymore. – Error-correcting code (ECC) vs. non-ECC RAM. » ECC RAM can detect and recover from (correct) errors in memory. » Much more expensive, but should be used in situations where an error can’t be tolerated. – Dual sided vs. single sided RAM. » Dual sided RAM is when the memory modules on a stick are separated in ranks; only one rank may be accessed at a time. » Single sided RAM is when the memory modules are not separated into ranks; it is faster but more expensive than dual sided RAM. Random access memory.
  • 13. Page 13 – Single channel vs. multi-channel RAM. » Single channel: all banks (slots) of RAM share a single 64 bit bus to the CPU. » Multi-channel RAM: the banks of RAM may be grouped together to form a wider bus to the CPU (128 bit or 192 bit). » To take advantage of the multi-channel capabilities, the RAM must be installed in matched sets. » Follow the motherboard documentation when installing multi-channel RAM. – Know what type of RAM your MB supports. » A motherboard will only support one type of RAM (DDR, DDR2, DDRs); you can’t mix them together. » The RAM modules are keyed on the bottom so that they can’t be placed in the wrong type of RAM slots. » You can install different speeds of RAM together, but the RAM will only function at the speed of the slowest module. Random access memory.
  • 14. Page 14 Random access memory. Computer memory usually refers to dynamic random access memory. SRAM is quicker but much more expensive. Topic Introducing RAM. Summary The DIMM is both ancient and new. All modern RAM is a type of DIMM. Modern RAM started with SDRAM and is currently working through DDR3. Parity RAM uses an extra bit to check for errors, but can’t recover from (correct) those errors. ECC RAM can recover from (correct) memory errors but is very expensive. Double sided RAM uses ranks; single sided doesn’t. Types of RAM. RAM may be used in single or multi-channel configurations, depending on the motherboard. When used in a multi-channel situation, follow the motherboard’s installation instructions. RAM may not be mixed and matched between types, but it can be done by speed. When RAM speeds don’t match, all RAM functions at the speed of the slowest. Special considerations of RAM.
  • 16. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.