SlideShare a Scribd company logo
1 of 8
Primary and
Secondary Memory
Submitted by: Maryam bashir
Section B (bs-llb-5058-23)
Submitted to: Sir sheraz tariq
Primary Memory
• Definition
Primary memory, often referred to as RAM (Random Access Memory), is the
temporary storage area used by a computer to actively execute processes and
run applications. It provides quick access to data that is actively in use,
facilitating the rapid retrieval and manipulation of information.
Characteristics
1. Volatility:
Primary memory is volatile, meaning it loses its content when the power is turned
off. This characteristic is essential for its role as a workspace for ongoing operations.
2. Speed:
Primary memory is much faster than secondary memory. The high-speed access
allows the CPU to fetch and store data rapidly during processing.
3. Direct Accessibility:
The CPU can directly access any location in primary memory, making it suitable
for the quick retrieval of instructions and data required for processing.
Types of Primary Memory
1. RAM (Random Access Memory):
• - RAM is the most common type of primary memory.
• - It is used to store data and machine code currently being used and processed by the computer.
• - The contents are volatile and are lost when the power is turned off.
2. Cache Memory:
• - Cache memory is a smaller, faster type of memory situated between the RAM and CPU.
• - It stores frequently accessed instructions and data to reduce the time needed for the CPU to retrieve information.
3. Registers:
• - Registers are the smallest and fastest type of primary memory.
• - Located within the CPU, registers store data used immediately by the CPU during its operations.
Secondary Memory
• Definition
Secondary memory serves as a non-volatile, long-term storage solution for a
computer. Unlike primary memory, it retains data even when the power is
turned off. Secondary memory is crucial for storing large amounts of data,
including the operating system, applications, and user files.
Characteristics
• 1. Non-Volatility: One of the key features of secondary memory is its non-volatile
nature. It retains data even when the computer is powered off, making it suitable for
long-term storage.
• 2. Capacity: Secondary memory typically has a much larger capacity compared to
primary memory. It is used to store the operating system, software applications, and
user-generated files.
• 3. Slower Access Speed: Secondary memory is slower than primary memory in
terms of access speed. Retrieving data from secondary memory takes more time
compared to the almost instant access provided by primary memory.
•
Types of Secondary Memory
1. Hard Disk Drives (HDD):
• - HDDs are traditional mechanical storage devices that use spinning disks to read and write data.
• - They offer large storage capacities and are commonly used in desktops and laptops.
2. Solid State Drives (SSD):
• - SSDs use flash memory to store data, providing faster access speeds and better durability compared to HDDs.
• - They are commonly found in modern laptops and high-performance computing systems.
3. Flash Drives:
• - Flash drives, or USB drives, are portable storage devices that use flash memory.
• - They are small, lightweight, and commonly used for transferring data between computers.
4. Optical Drives:
• - Optical drives, such as CD-ROMs and DVDs, use laser technology to read and write data on optical discs.
• - While becoming less common, they are still used for specific applications like software installation and media playback.
Interaction Between Primary and
Secondary Memory
• Computers use a hierarchical approach to memory management, with data moving between
primary and secondary memory as needed. When a computer is powered on, the operating
system and frequently used applications are loaded from secondary memory into primary
memory for faster access. During operation, data is continuously exchanged between
primary and secondary memory to ensure efficient processing.
• In summary, primary and secondary memory play complementary roles in the functionality
of a computer. Primary memory provides the immediate workspace for active processes,
offering high-speed access and volatile storage. On the other hand, secondary memory
serves as a long-term storage solution, retaining data even when the power is off and
providing the necessary capacity for the operating system and user files. Together, these two
types of memory contribute to the seamless functioning of modern computing systems.

More Related Content

Similar to Primary and Secondary Memory.pptx

Main memory of computer .ppt
Main memory of computer .pptMain memory of computer .ppt
Main memory of computer .pptBasraJaswinder
 
AI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxAI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxsanjutoppo93
 
Basic information about Computer memory
Basic information about Computer memoryBasic information about Computer memory
Basic information about Computer memoryRamesh Pant
 
storage devices. ITC FLOPPY DISC USB CLOUD STORAGE
storage devices. ITC FLOPPY DISC USB CLOUD STORAGEstorage devices. ITC FLOPPY DISC USB CLOUD STORAGE
storage devices. ITC FLOPPY DISC USB CLOUD STORAGEmahjabeen344727
 
storage devices.pdf
storage devices.pdfstorage devices.pdf
storage devices.pdfFajar Iqbal
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inclistergc
 
BBA CHAPTER COMPUTER HARDWARE 5 .pptx
BBA CHAPTER COMPUTER HARDWARE    5 .pptxBBA CHAPTER COMPUTER HARDWARE    5 .pptx
BBA CHAPTER COMPUTER HARDWARE 5 .pptxRoshanKC10
 
Memory organization
Memory organizationMemory organization
Memory organizationAL- AMIN
 

Similar to Primary and Secondary Memory.pptx (20)

Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Main memory of computer .ppt
Main memory of computer .pptMain memory of computer .ppt
Main memory of computer .ppt
 
Hardware
HardwareHardware
Hardware
 
computer storage
computer storagecomputer storage
computer storage
 
Presentation (2).pptx
Presentation (2).pptxPresentation (2).pptx
Presentation (2).pptx
 
AI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptxAI and EXPERT SYSTEM of expert system .pptx
AI and EXPERT SYSTEM of expert system .pptx
 
Memory
MemoryMemory
Memory
 
Basic information about Computer memory
Basic information about Computer memoryBasic information about Computer memory
Basic information about Computer memory
 
Fundamentals of Computing Chapter 6
Fundamentals of Computing Chapter 6Fundamentals of Computing Chapter 6
Fundamentals of Computing Chapter 6
 
computer
computer computer
computer
 
Computer memory
Computer memoryComputer memory
Computer memory
 
storage devices. ITC FLOPPY DISC USB CLOUD STORAGE
storage devices. ITC FLOPPY DISC USB CLOUD STORAGEstorage devices. ITC FLOPPY DISC USB CLOUD STORAGE
storage devices. ITC FLOPPY DISC USB CLOUD STORAGE
 
Computer Memory.pptx
Computer Memory.pptxComputer Memory.pptx
Computer Memory.pptx
 
storage devices.pdf
storage devices.pdfstorage devices.pdf
storage devices.pdf
 
coa memories
coa memoriescoa memories
coa memories
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inc
 
BBA CHAPTER COMPUTER HARDWARE 5 .pptx
BBA CHAPTER COMPUTER HARDWARE    5 .pptxBBA CHAPTER COMPUTER HARDWARE    5 .pptx
BBA CHAPTER COMPUTER HARDWARE 5 .pptx
 
Memory organization
Memory organizationMemory organization
Memory organization
 
Basic of computer 2
Basic of computer 2Basic of computer 2
Basic of computer 2
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 

Recently uploaded

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Primary and Secondary Memory.pptx

  • 1. Primary and Secondary Memory Submitted by: Maryam bashir Section B (bs-llb-5058-23) Submitted to: Sir sheraz tariq
  • 2. Primary Memory • Definition Primary memory, often referred to as RAM (Random Access Memory), is the temporary storage area used by a computer to actively execute processes and run applications. It provides quick access to data that is actively in use, facilitating the rapid retrieval and manipulation of information.
  • 3. Characteristics 1. Volatility: Primary memory is volatile, meaning it loses its content when the power is turned off. This characteristic is essential for its role as a workspace for ongoing operations. 2. Speed: Primary memory is much faster than secondary memory. The high-speed access allows the CPU to fetch and store data rapidly during processing. 3. Direct Accessibility: The CPU can directly access any location in primary memory, making it suitable for the quick retrieval of instructions and data required for processing.
  • 4. Types of Primary Memory 1. RAM (Random Access Memory): • - RAM is the most common type of primary memory. • - It is used to store data and machine code currently being used and processed by the computer. • - The contents are volatile and are lost when the power is turned off. 2. Cache Memory: • - Cache memory is a smaller, faster type of memory situated between the RAM and CPU. • - It stores frequently accessed instructions and data to reduce the time needed for the CPU to retrieve information. 3. Registers: • - Registers are the smallest and fastest type of primary memory. • - Located within the CPU, registers store data used immediately by the CPU during its operations.
  • 5. Secondary Memory • Definition Secondary memory serves as a non-volatile, long-term storage solution for a computer. Unlike primary memory, it retains data even when the power is turned off. Secondary memory is crucial for storing large amounts of data, including the operating system, applications, and user files.
  • 6. Characteristics • 1. Non-Volatility: One of the key features of secondary memory is its non-volatile nature. It retains data even when the computer is powered off, making it suitable for long-term storage. • 2. Capacity: Secondary memory typically has a much larger capacity compared to primary memory. It is used to store the operating system, software applications, and user-generated files. • 3. Slower Access Speed: Secondary memory is slower than primary memory in terms of access speed. Retrieving data from secondary memory takes more time compared to the almost instant access provided by primary memory. •
  • 7. Types of Secondary Memory 1. Hard Disk Drives (HDD): • - HDDs are traditional mechanical storage devices that use spinning disks to read and write data. • - They offer large storage capacities and are commonly used in desktops and laptops. 2. Solid State Drives (SSD): • - SSDs use flash memory to store data, providing faster access speeds and better durability compared to HDDs. • - They are commonly found in modern laptops and high-performance computing systems. 3. Flash Drives: • - Flash drives, or USB drives, are portable storage devices that use flash memory. • - They are small, lightweight, and commonly used for transferring data between computers. 4. Optical Drives: • - Optical drives, such as CD-ROMs and DVDs, use laser technology to read and write data on optical discs. • - While becoming less common, they are still used for specific applications like software installation and media playback.
  • 8. Interaction Between Primary and Secondary Memory • Computers use a hierarchical approach to memory management, with data moving between primary and secondary memory as needed. When a computer is powered on, the operating system and frequently used applications are loaded from secondary memory into primary memory for faster access. During operation, data is continuously exchanged between primary and secondary memory to ensure efficient processing. • In summary, primary and secondary memory play complementary roles in the functionality of a computer. Primary memory provides the immediate workspace for active processes, offering high-speed access and volatile storage. On the other hand, secondary memory serves as a long-term storage solution, retaining data even when the power is off and providing the necessary capacity for the operating system and user files. Together, these two types of memory contribute to the seamless functioning of modern computing systems.