Secondary memory is where programs and data are kept on a long-term basis. Common secondary storage devices are the hard disk and optical disks. The hard disk has enormous storage capacity compared to main memory. The hard disk is usually contained inside the case of a computer.
Computer memory is any physical device capable of storing information temporarily or permanently.
Memory is the most essential part of a computer.
Without memory there would be no computer, as we know it today.
Modern computers use semiconductor memory
It is made up of thousands of circuits (paths) for electrical currents on a single silicon chip
This can be divided into three categories
-Internal processor Memory
-Main Memory
-Secondary Memory
Primary memory (main memory)
complete knowledge about main memory Ram Rom and its kinds
with history and pictures
try it to believe it
Main memory refers to physical memory that is internal to the computer
You can present like this :
Good to all
I am --
going to present a presentation on Computer c.p.u
We all know that cpu consist of three elements
C.U,ALU,MU ___ Explain little all because are main focus on secondary memory
FOUND ANY ERROR PLEASE COMMENT
Thank you
Computer memory is any physical device capable of storing information temporarily or permanently.
Memory is the most essential part of a computer.
Without memory there would be no computer, as we know it today.
Modern computers use semiconductor memory
It is made up of thousands of circuits (paths) for electrical currents on a single silicon chip
This can be divided into three categories
-Internal processor Memory
-Main Memory
-Secondary Memory
Primary memory (main memory)
complete knowledge about main memory Ram Rom and its kinds
with history and pictures
try it to believe it
Main memory refers to physical memory that is internal to the computer
You can present like this :
Good to all
I am --
going to present a presentation on Computer c.p.u
We all know that cpu consist of three elements
C.U,ALU,MU ___ Explain little all because are main focus on secondary memory
FOUND ANY ERROR PLEASE COMMENT
Thank you
This section of the memory is also referred to as backup storage.
The storage capacity of primary storage is not sufficient to store the large volume so secondary storage.
Secondary storage also know as external memory or auxiliary storage not directly accessible by the CPU.
Characteristics of Computer is There Its Too Easy and Very simple words are used in This Content and Please Comment Your Feedback and here we also Give More and More Knowledge and Unique. Computer Science all Notes are Uploaded Soon Please Keep Is Watch
RAM(Random Access memory) is a volatile memory.RAM is our working memory storage. All the data, which the PC uses and works with during operation, are stored here. Data are stored on drives, typically the hard drive. However, for the CPU to work with those data, they must be read into the working memory storage, which is made up of RAM chips.
Historical review:
Back in the 80's, PC's were equipped with RAM in quantities of 64 KB, 256 KB, 512 KB and finally 1 MB. Around 1990, advanced operating systems, like Windows, appeared on the market, that started the RAM race. The PC needed more and more RAM. That worked fine with the 386 processor, which could address larger amount of RAM. The first Windows operated PC's could address 2 MB RAM, but 4 MB soon became the standard. The race has continued through the 90's, as RAM prices have dropped dramatically. Today it would be foolish to consider less than 64 MB RAM in a PC. The OS like windows Xp requires better than this.
This section of the memory is also referred to as backup storage.
The storage capacity of primary storage is not sufficient to store the large volume so secondary storage.
Secondary storage also know as external memory or auxiliary storage not directly accessible by the CPU.
Characteristics of Computer is There Its Too Easy and Very simple words are used in This Content and Please Comment Your Feedback and here we also Give More and More Knowledge and Unique. Computer Science all Notes are Uploaded Soon Please Keep Is Watch
RAM(Random Access memory) is a volatile memory.RAM is our working memory storage. All the data, which the PC uses and works with during operation, are stored here. Data are stored on drives, typically the hard drive. However, for the CPU to work with those data, they must be read into the working memory storage, which is made up of RAM chips.
Historical review:
Back in the 80's, PC's were equipped with RAM in quantities of 64 KB, 256 KB, 512 KB and finally 1 MB. Around 1990, advanced operating systems, like Windows, appeared on the market, that started the RAM race. The PC needed more and more RAM. That worked fine with the 386 processor, which could address larger amount of RAM. The first Windows operated PC's could address 2 MB RAM, but 4 MB soon became the standard. The race has continued through the 90's, as RAM prices have dropped dramatically. Today it would be foolish to consider less than 64 MB RAM in a PC. The OS like windows Xp requires better than this.
Chapter 1 computer hardware and flow of informationFrankie Jones
FP203 Computer Organization
Chapter 1 computer hardware and flow of information
This topic covers the computer fundamentals, functional unit,
basic operational concepts and bus structure.
Storage devices are a evolving nowadays, especially because our storage appetites are growing every second. The presentation talks about various types of storage, why it is used, and basically, the advantages and disadvantages of the storage discussed.
Computer Introduction-Lecture02 for applied scince college students, Seiyun University , yemen 2023-2024 Academic year. لطلاب كلية العلوم التطبيقية بجامعة سيئون
مقدمة في علوم الحاسوب المحاضرة الثانية
MLDM provides an original scientific position in Europe on problems related to pattern recognition, machine learning, classification, modelling, knowledge extraction and data mining. These issues have a strong employability potential for students trained in the field of modelling, prediction or decision support, as well as in the area of the Web, image and video processing, health informatics, etc.
For graphs of mathematical functions, see Graph of a function. For other uses, see Graph (disambiguation). A drawing of a graph. In mathematics graph theory is the study of graphs, which are mathematical structures used.In mathematics, and more specifically in graph theory, a tree is an undirected graph in which any two vertices are connected by exactly one path. In other words, any acyclic connected graph is a tree. A forest is a disjoint union of trees.
Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH) are standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber using lasers or light-emitting diodes (LEDs). Lower data rates can also be transferred via an electrical interface.
Discrete Mathematics - Sets. ... He had defined a set as a collection of definite and distinguishable objects selected by the means of certain rules or description. Set theory forms the basis of several other fields of study like counting theory, relations, graph theory and finite state machines.
Discrete Mathematics - Sets. ... He had defined a set as a collection of definite and distinguishable objects selected by the means of certain rules or description. Set theory forms the basis of several other fields of study like counting theory, relations, graph theory and finite state machines.
The Parallel RLC Circuit is the exact opposite to the series circuit we looked at in the previous tutorial although some of the previous concepts and equations still apply.
The Parallel RLC Circuit is the exact opposite to the series circuit we looked at in the previous tutorial although some of the previous concepts and equations still apply.
Discrete Mathematics - Relations. ... Relations may exist between objects of the same set or between objects of two or more sets. Definition and Properties. A binary relation R from set x to y (written as x R y o r R ( x , y ) ) is a subset of the Cartesian product x × y .
Propositional calculus (also called propositional logic, sentential calculus, sentential logic, or sometimes zeroth-order logic) is the branch of logic concerned with the study of propositions (whether they are true or false) that are formed by other propositions with the use of logical connectives, and how their value depends on the truth value of their components. Logical connectives are found in natural languages.
Propositional calculus (also called propositional logic, sentential calculus, sentential logic, or sometimes zeroth-order logic) is the branch of logic concerned with the study of propositions (whether they are true or false) that are formed by other propositions with the use of logical connectives, and how their value depends on the truth value of their components. Logical connectives are found in natural languages.
In computer science, Prim's algorithm is a greedy algorithm that finds a minimum spanning tree for a weighted undirected graph. This means it finds a subset of the edges that forms a tree that includes every vertex, where the total weight of all the edges in the tree is minimized.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. WHAT IS SECINDARY MEMORY ?
PURPOSE OF SECONDARY MEMORY.
DIFFERENCE WITH PRIMARY MEMORY.
SHORTY DESCRIBE ABOUT HARD DISK.
Introduction :
3. What is secondary memory?
A memory, which stores data and programs for a long period of
time, is called secondary memory. This memory can also be
called backup storage memory or mass storage media.
Although it is placed in lower position due to low speed, low
cost and large size, it has a very large storage capacity.
Floppy disk, Hard Disk, CD-ROM, DVD, Zip Disk, pen drive,
micros card, etc are secondary memories
4. 1)Secondary storage is nonvolatile memory, that stored in
it is not lost when power is turned off.
2)The computer transfers instruction and data between
RAM and secondary storage.
3)As compared to primary memory it is slow, less costly
and possesses high capacity.
Purpose of secondary memory
5. What are the differences between Primary
and Secondary Memory?
Primary
memory
Secondary memory
The memory devices used for primary
memory are semiconductor memories
The secondary memory devices are
magnetic and optical memories.
The primary memory is categorized as
volatile and non volatile memories, RAM
is the volatile memory and ROM is the
non volatile memory
The secondary memory is always non
volatile
Primary memory is known as main
memory
Secondary memory is known as
additional memory or back memory
These memories are also called as
internal memory
These memories are also called as
external memory
The primary memory devices are The secondary memory devices are
6. Shorty describe about hard
disk.
Hard disks are usually found inside computers to store programs
and data. They are increasingly cheap and more and more
companies are using them to back things up. Hard disks can vary
in physical size with some disks getting as small as your thumb.
The capacity of a commercial disk is currently up to about 2
terabytes allowing users to read and write to them. They are
constructed from several key components:
Platter - Metallic disks where One or both sides of the platter are
magnetized, allowing data to be stored. The platter spins
thousands of times a second around the spindle. There may be
several platters, with data stored across them
7. Head - The head reads magnetic data from the platter.
For a drive with several platters there may two heads
per platter allowing data to be read from top and bottom
of each
Actuator Arm - used to move the read heads in and out
of the disk, so that data can be read and written to
particular locations and you can access data in a
Random fashion, you don't need to read your way
through the entire disk to fetch a particular bit of
information, you can jump right there. Seek time is very
low.
8. Power connector - provides electricity to spin the platters,
move the read head and run the electronics
IDE connector - allows for data transfer from and to the
platters
Jumper block - used to get the disk working in specific
ways such as RAID
9. how a hard disk works:
A. The platters spin around the spindle
B. data is requested to be read from a particular area of a
platter
C. the actuator arm moves the read head to that track
D. Once the data sector that is required has spun around
and under the read head, data is read
E. Read data is sent from the IDE connector to main
memory
END