SlideShare a Scribd company logo
As the word implies “memory” means the place where
we have to store any thing, this is very essential part of
human being just like this memory is also very
important for computer system because in computer
system we have to store some data or information and
for storing these items we need some memory or
space.
So that’s why we can say that memory is very important
part of computer system.
There are various units which are used to measure
computer memory
 Bit - Smallest unit of computer memory
 Byte - 8 bit = 1 byte
 Kilobyte - 1024 byte = 1 kb
 Megabyte - 1024 kb = 1 mb
 Gigabyte - 1024 mb = 1 gb
 Terabyte - 1024 gb = 1 tb
1. Primary Memory :-
Primary memory also known as “main memory”
or “internal memory” which is located in the mother
board of system or as we say which is directly
connected to the CPU. It is the place where only little
bit of data are stored either by manufacturer or by
user.
This is further divided into two parts :-
 RAM
 ROM
RAM also known as “random access memory” it stores
the data which the user currently uses or as we say it
stores the data temporary in it. RAM needs power or
electricity to work when the computer power is turned
off then all the data in it will be erased automatically.
This is a circuit which have its separate space or slot in
motherboard. This allows the computer to run the
software faster.
RAM is further classified into two parts
 SRAM
 DRAM
SRAM :-
Known as Static RAM. The word “static” refers that the
memory retains its contents as long as the power is
supplied so that’s why we can say this is volatile in
nature. SRAM does not need to be refreshed
periodically . SRAM is faster but more expensive than
DRAM.
DRAM :-
Known as Dynamic RAM. It also contains data only
when electricity is available. DRAM needs to refreshed
periodically due to this, this RAM works slower than
SRAM. Mainly general PC uses this RAM because it is
much cheaper than SRAM and requires less space.
Known as “Read Only Memory” as the word refers
mainly it can only read the data which in stored in it.
This memory is mainly used by our computer when we
just turn on our computer. It contains BIOS of system.
This is non-volatile in nature.
Mainly there are three types of ROM :-
 PROM
 EPROM
 EEPROM
Known as “programmable Read Only memory”. In this
when the data is stored then we have no right to
change or alter any data to it. In this the data is written
by Manufacturer company, even you can also purchase
blank PROM chip but it can be programmed by special
tool such as PROM programmers. In general PC’s
mainly PROM is used because we don’t have to alter
any data to it
Known as “Erasable PROM” as the word refers “erasable”
means we can change or erase the data. So in EPROM
we have right to change the data. In this we can change
the data with the help of ultra violet rays. EPROM is
much expensive than PROM.
Known as “Electrically Erasable PROM” the type of ROM
which can be erased by electrical charges. EEPROM
can be erased one byte at anytime rather than erasing
the entire chip by ultra violet rays.
The place where we store our personal data in computer
system is known as SM. In this we store data so that
when the data is needed we can easily retrieve it.
This is the fundamental component of comp. system.
It is non volatile in nature so that we can not loose
the data when power supply is off.
There are two methods for accessing the data from it :-
1. Sequential – This is the method in which we search
the data sequentially or line by line until you find the
desired data. E.g.. Magnetic tape, etc.
2. Direct – This is the method in which computer can
go directly to the information that the user wants.
e.g. magnetic disk, optical disk, etc.
Now I am going to discuss some of the secondary storage
devices :-
1. Magnetic Tape :- Magnetic tape appears similar to
the tape used in music cassettes. It is a plastic tape
with magnetic coating. Mainly it is used to store
music, movie, etc. it is not used to store data in it
because as we know it comes under sequential access
and it reads data line by line so that we can’t find the
exact location of data.
2. Magnetic Disk :- This is widely used popular storage
medium for direct access secondary storage. This is
the place where data are automatically save when we
click on save button. It is non- volatile so that once
data is stored in it will not lost when power goes off.
This is the storage device where we mainly store or
install OS for system.
Some of the magnetic disk are as follows :-
Hard Disk
Floppy Disk, etc.
Hard Disk
Hard Disk also known as “Hard Drive” or “Fixed Drive”.
This is the place where we store our data or
information so that we can retrieve for further use.
This is the place where we install our OS so that we can
run our computer. Hard disk comes fix in our system
and if you require more hard disk then it comes in
removable also. The average computer today comes
with a 250 to 500 gb hard drive.
Floppy Disk
This is removable, round, flat piece of Mylar plastic,
coated with a ferric oxide. this kind of disk is read and
written by Floppy Disk Drive (FDD), which is a device
which performs basic operations on disk including
reading and writing of data to it. This was used to
transfer data from one computer to another. Earlier 5
¼” floppy disks were used but these disks have less
storage capacity so new format of 3 1/2” floppy disk
came in market. Now a days floppy disk are not used
because off less storage and high rate.
Optical Disk
This is the secondary storage medium in which you can
store much more data in it. This is flat, circular, plastic
disk coated with material. Optical disk is very popular
because of its small size and huge storage capacity. You
must have optical disk reader in your computer so that
you can read or write data on it.
There are two types of optical disk :-
1. CD
2. DVD
CD.
Known as “Compact Disk”, mainly used to store data, music,
movie, software, etc. it can store 80 minutes of continues
video recording. The space of CD is up to 700 mb. Due to
its high storage capacity it is widely used. The data are store
in it is in the form of “Pitts”. To avail the services of CD your
computer should have CD drive.
There are two types of CD :-
1. CD ROM.
2. CD R/W.
DVD
Known as “Digital Versatile Disk”. It is high capacity
storage medium. Mainly used to store movie, music,
software, etc. the storage capacity of DVD is up to 4.7
gb. It looks similar to CD but due to its high storage
capacity it is not cheaper as CD. To avail the facility of
DVD you must have DVD drive in your computer. DVD
drive also gives you facility to run CD disks too.
Types of DVD :-
1. DVD ROM.
2. DVD R/W.
Presentation on computer memory

More Related Content

What's hot

Basic information about Computer memory
Basic information about Computer memoryBasic information about Computer memory
Basic information about Computer memory
Ramesh Pant
 
Modelos de arquitecturas de computadoras
Modelos de arquitecturas de computadorasModelos de arquitecturas de computadoras
Modelos de arquitecturas de computadoras
YESENIA CETINA
 
Budowa Komputera
Budowa KomputeraBudowa Komputera
Budowa Komputeraguest006c26
 
External Memory
External  MemoryExternal  Memory
External Memory
Rup Chowdhury
 
RAM (Random Access Memory)
RAM (Random Access Memory)RAM (Random Access Memory)
RAM (Random Access Memory)
Md Waresul Islam
 
Storage devices
Storage devicesStorage devices
Storage devices
Purvesh Shinde
 
Operating System-Memory Management
Operating System-Memory ManagementOperating System-Memory Management
Operating System-Memory Management
Akmal Cikmat
 
P1 the function of main hardware components
P1 the function of main hardware componentsP1 the function of main hardware components
P1 the function of main hardware components
mollyoneillx
 
Linux presentation
Linux presentationLinux presentation
Linux presentationNikhil Jain
 
Computer memory in general
Computer memory in generalComputer memory in general
Computer memory in general
Priyank Panchal
 
Presentation on C.P.U
Presentation on C.P.UPresentation on C.P.U
Presentation on C.P.Ufgdgxvbm98
 
Cpu
CpuCpu
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER Rajat More
 
Memória Ram - Aula Completa
Memória Ram - Aula CompletaMemória Ram - Aula Completa
Memória Ram - Aula Completa
Universidade Zambeze
 
Storage device
Storage deviceStorage device
Storage device
Tejas Moka
 
소프트웨어의 동작 방식 이해
소프트웨어의 동작 방식 이해소프트웨어의 동작 방식 이해
소프트웨어의 동작 방식 이해
중선 곽
 
Linux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell ScriptingLinux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell Scripting
Emertxe Information Technologies Pvt Ltd
 
Computer memory
Computer memoryComputer memory
Computer memory
Jayapal Jp
 
Memory
MemoryMemory

What's hot (20)

Basic information about Computer memory
Basic information about Computer memoryBasic information about Computer memory
Basic information about Computer memory
 
Modelos de arquitecturas de computadoras
Modelos de arquitecturas de computadorasModelos de arquitecturas de computadoras
Modelos de arquitecturas de computadoras
 
Budowa Komputera
Budowa KomputeraBudowa Komputera
Budowa Komputera
 
External Memory
External  MemoryExternal  Memory
External Memory
 
RAM (Random Access Memory)
RAM (Random Access Memory)RAM (Random Access Memory)
RAM (Random Access Memory)
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Operating System-Memory Management
Operating System-Memory ManagementOperating System-Memory Management
Operating System-Memory Management
 
P1 the function of main hardware components
P1 the function of main hardware componentsP1 the function of main hardware components
P1 the function of main hardware components
 
Linux presentation
Linux presentationLinux presentation
Linux presentation
 
Computer memory in general
Computer memory in generalComputer memory in general
Computer memory in general
 
Presentation on C.P.U
Presentation on C.P.UPresentation on C.P.U
Presentation on C.P.U
 
Cpu
CpuCpu
Cpu
 
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
TYPES OF MEMORIES AND STORAGE DEVICE AND COMPUTER
 
Memória Ram - Aula Completa
Memória Ram - Aula CompletaMemória Ram - Aula Completa
Memória Ram - Aula Completa
 
Storage device
Storage deviceStorage device
Storage device
 
소프트웨어의 동작 방식 이해
소프트웨어의 동작 방식 이해소프트웨어의 동작 방식 이해
소프트웨어의 동작 방식 이해
 
Linux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell ScriptingLinux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell Scripting
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Memory
MemoryMemory
Memory
 
Memoria RAM
Memoria RAMMemoria RAM
Memoria RAM
 

Similar to Presentation on computer memory

Computer Memory
Computer MemoryComputer Memory
Computer Memory
babaradhe
 
Computer memory
Computer memoryComputer memory
Computer memory
sandeipz
 
memory organization of a computer
memory organization of a computer memory organization of a computer
memory organization of a computer Ashaduzzaman Kanon
 
Presentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptxPresentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptx
Uttamkumar471388
 
Memory in computer
Memory in computerMemory in computer
Memory in computer
ahmed51236
 
Computer memory
Computer memoryComputer memory
Computer memory
SophiyaPrabin
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
Ritu Jhalani
 
CBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer OrganizationCBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer Organization
FaizSSIS
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
Dr. Mazin Mohamed alkathiri
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
Raj vardhan
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
Mirza Ćutuk
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devicesPichano Kikon
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
julitolosbanos
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
SriShailam5
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
Ashish Kumar
 
Memory & storage devices
Memory & storage devicesMemory & storage devices
Memory & storage devices
Hamza Mughal
 

Similar to Presentation on computer memory (20)

Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Computer memory
Computer memoryComputer memory
Computer memory
 
memory
memorymemory
memory
 
memory organization of a computer
memory organization of a computer memory organization of a computer
memory organization of a computer
 
Presentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptxPresentation on Computer Memory-1.pptx
Presentation on Computer Memory-1.pptx
 
Memory in computer
Memory in computerMemory in computer
Memory in computer
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Memory 02
Memory 02Memory 02
Memory 02
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
CBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer OrganizationCBSE Informatics Practices Chapter-11 Basic Computer Organization
CBSE Informatics Practices Chapter-11 Basic Computer Organization
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
 
Memory system of a compture
Memory system of a comptureMemory system of a compture
Memory system of a compture
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
 
Memory & storage devices
Memory & storage devicesMemory & storage devices
Memory & storage devices
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Presentation on computer memory

  • 1.
  • 2. As the word implies “memory” means the place where we have to store any thing, this is very essential part of human being just like this memory is also very important for computer system because in computer system we have to store some data or information and for storing these items we need some memory or space. So that’s why we can say that memory is very important part of computer system.
  • 3. There are various units which are used to measure computer memory  Bit - Smallest unit of computer memory  Byte - 8 bit = 1 byte  Kilobyte - 1024 byte = 1 kb  Megabyte - 1024 kb = 1 mb  Gigabyte - 1024 mb = 1 gb  Terabyte - 1024 gb = 1 tb
  • 4. 1. Primary Memory :- Primary memory also known as “main memory” or “internal memory” which is located in the mother board of system or as we say which is directly connected to the CPU. It is the place where only little bit of data are stored either by manufacturer or by user. This is further divided into two parts :-  RAM  ROM
  • 5. RAM also known as “random access memory” it stores the data which the user currently uses or as we say it stores the data temporary in it. RAM needs power or electricity to work when the computer power is turned off then all the data in it will be erased automatically. This is a circuit which have its separate space or slot in motherboard. This allows the computer to run the software faster.
  • 6. RAM is further classified into two parts  SRAM  DRAM SRAM :- Known as Static RAM. The word “static” refers that the memory retains its contents as long as the power is supplied so that’s why we can say this is volatile in nature. SRAM does not need to be refreshed periodically . SRAM is faster but more expensive than DRAM.
  • 7. DRAM :- Known as Dynamic RAM. It also contains data only when electricity is available. DRAM needs to refreshed periodically due to this, this RAM works slower than SRAM. Mainly general PC uses this RAM because it is much cheaper than SRAM and requires less space.
  • 8. Known as “Read Only Memory” as the word refers mainly it can only read the data which in stored in it. This memory is mainly used by our computer when we just turn on our computer. It contains BIOS of system. This is non-volatile in nature. Mainly there are three types of ROM :-  PROM  EPROM  EEPROM
  • 9. Known as “programmable Read Only memory”. In this when the data is stored then we have no right to change or alter any data to it. In this the data is written by Manufacturer company, even you can also purchase blank PROM chip but it can be programmed by special tool such as PROM programmers. In general PC’s mainly PROM is used because we don’t have to alter any data to it
  • 10. Known as “Erasable PROM” as the word refers “erasable” means we can change or erase the data. So in EPROM we have right to change the data. In this we can change the data with the help of ultra violet rays. EPROM is much expensive than PROM.
  • 11. Known as “Electrically Erasable PROM” the type of ROM which can be erased by electrical charges. EEPROM can be erased one byte at anytime rather than erasing the entire chip by ultra violet rays.
  • 12. The place where we store our personal data in computer system is known as SM. In this we store data so that when the data is needed we can easily retrieve it. This is the fundamental component of comp. system. It is non volatile in nature so that we can not loose the data when power supply is off. There are two methods for accessing the data from it :- 1. Sequential – This is the method in which we search the data sequentially or line by line until you find the desired data. E.g.. Magnetic tape, etc. 2. Direct – This is the method in which computer can go directly to the information that the user wants. e.g. magnetic disk, optical disk, etc.
  • 13. Now I am going to discuss some of the secondary storage devices :- 1. Magnetic Tape :- Magnetic tape appears similar to the tape used in music cassettes. It is a plastic tape with magnetic coating. Mainly it is used to store music, movie, etc. it is not used to store data in it because as we know it comes under sequential access and it reads data line by line so that we can’t find the exact location of data.
  • 14. 2. Magnetic Disk :- This is widely used popular storage medium for direct access secondary storage. This is the place where data are automatically save when we click on save button. It is non- volatile so that once data is stored in it will not lost when power goes off. This is the storage device where we mainly store or install OS for system. Some of the magnetic disk are as follows :- Hard Disk Floppy Disk, etc.
  • 15. Hard Disk Hard Disk also known as “Hard Drive” or “Fixed Drive”. This is the place where we store our data or information so that we can retrieve for further use. This is the place where we install our OS so that we can run our computer. Hard disk comes fix in our system and if you require more hard disk then it comes in removable also. The average computer today comes with a 250 to 500 gb hard drive.
  • 16. Floppy Disk This is removable, round, flat piece of Mylar plastic, coated with a ferric oxide. this kind of disk is read and written by Floppy Disk Drive (FDD), which is a device which performs basic operations on disk including reading and writing of data to it. This was used to transfer data from one computer to another. Earlier 5 ¼” floppy disks were used but these disks have less storage capacity so new format of 3 1/2” floppy disk came in market. Now a days floppy disk are not used because off less storage and high rate.
  • 17. Optical Disk This is the secondary storage medium in which you can store much more data in it. This is flat, circular, plastic disk coated with material. Optical disk is very popular because of its small size and huge storage capacity. You must have optical disk reader in your computer so that you can read or write data on it. There are two types of optical disk :- 1. CD 2. DVD
  • 18. CD. Known as “Compact Disk”, mainly used to store data, music, movie, software, etc. it can store 80 minutes of continues video recording. The space of CD is up to 700 mb. Due to its high storage capacity it is widely used. The data are store in it is in the form of “Pitts”. To avail the services of CD your computer should have CD drive. There are two types of CD :- 1. CD ROM. 2. CD R/W.
  • 19. DVD Known as “Digital Versatile Disk”. It is high capacity storage medium. Mainly used to store movie, music, software, etc. the storage capacity of DVD is up to 4.7 gb. It looks similar to CD but due to its high storage capacity it is not cheaper as CD. To avail the facility of DVD you must have DVD drive in your computer. DVD drive also gives you facility to run CD disks too. Types of DVD :- 1. DVD ROM. 2. DVD R/W.