SlideShare a Scribd company logo
Storing Data
Abdul Wajid

1
Storage of Data
Instructions and data are held in main memory
which is divided into millions of addressable
storage units called bytes.
One byte can hold one character
One byte can hold 8 bits
Computers work by using pulses of voltage
which represent either 1 or 0
A low voltage mean 0 and high voltage mean 1
Total bytes in main memory referred to as the
computer’s memory size.

2
Bits
Computers use electronic circuits to
perform the tasks they are
programmed to complete.
These circuits can be in one of two
states - ‘On’ or ‘Off’.

3
Memory Sizes measurement
I nibble
= 4 bits
I byte
= 8 bits
I kilobytes (kb)
= 1024 bytes
1 Megabytes (Mb) = 1024kilobytes
1 gigabytes (Gb) = 1024Megabytes
1 terabytes (TB) = 1024Gigabytes

4
Memory ( Main store)
 Memory is the name given to the group of chips inside
the processing unit
 The data held in the memory is available to the computer
Memory is used to hold following information
 Programs
 Input data
 Working Area
 Output data
 There are two types of main memory
 Ram (Random access memory )
 ROM (Read only memory )
5
RAM & ROM
Ram

ROM
Its temporary memory Its Permanent memory
Read and Write data It can only be read
Data can be changed Data can not change or
deleted
or deleted
It is a Volatile memory It is non Volatile
The instructions are
The instructions
written into Rom at
written in Ram at the
manufacturing time.
time of execution
(BIOS)

6
Semiconductor

Volatile

Memory
types
Non-volatile

RAM

SRAM

ROM

DRAM

PROM

EPROM

7
PROM & EPROM
PROM
 Programmable read only
memory
 User can write instruction
only one time
 Instructions can not be
erased
 If there is error while
writing on PROM ,it
becomes unusable

EPROM
 Erasable programmable
Rom
 User can write instruction
many times
 Instructions can be
erased
 If there is error while
writing on EPROM, it can
still be used again
8
SRAM & DRAM
SRAM
Static Random Access
Memory
It can store its value
without any need to
refresh the data as
long as the power is
available
It utilizes less power
It is more expansive

DRAM
Dynamic Random
Access Memory
It has to be refreshed
after each read
operation.
It utilizes more power
It is less expansive

9
Floppy Disk
Used to transfer small amount of data between
computers
Come with 3.5 inch disk drive
Floppy disk is the hard case the disk inside in
floppy
Magnetic disk store binary data as a magnetic
pattern on the disk surface
It hold 1.44MB of data
Before the data is stored on a disk the disk
needs to be formatted
10
Hard drives
 Consist a several disks on a single
spindle
 Each disk surface able to store data
 Each surface can have its own
read/write head
 This enables the read/write heads to
operate simultaneously which means
that the data can be transferred more
quickly than by using the large disk
 Hard disk is available in all sorts of
sizes
 A typical computer will have a hard disk
capacity of around 20 GB

11
Hard Disk Mechanism

12
Magnetic Tape
Large spools of tape are used very large
computer systems that need to hold huge
amount of data
They are not as common as they used to
be
They look similar to audio cassettes
except they are larger
Their main use is for making backup
copies of hard disk

13
CD-ROM Drives
Use the same technology as music CD and CD
players
The data is stored on the disk digitally and a
laser beam is used to read the disk
Light is used to read the disk the data may be
packed closely and disk therefore has a huge
capacity
Are included in multimedia system
CD-ROMs can be filled with clip art
,encyclopedia ,photograph and all sort of data
Are read only disk
A CD holds around 600MB data
14
CD-R
A CD recordable (CD-R) drive has a
read/write capability.
Using this device you can write around 15
minutes
CD-R can be used to back up hard drives.
Standard CD-R disks can be written to
only once but there is a type of disks can
be written, erased and rewritten
They are more expensive than CD-R
disks

15
Digital Versatile Disks (DVD)
 Are similar to CD-ROMs in that they look identical and
are used to store lots of date.
 Like CD-ROM they can be used to store computer
application software, multimedia programs and full length
movies
 This is because CD-Rom typically store 650 MB of data
whereas to a DVD stores between 4.7 GB
 DVDs also are used to store movies where they produce
much better quality pictures and sound compared to a
normal video tape.
 A film stored on DVD can even be made to offer the
viewer a choice of several languages in which it can be
played back
16
Backup devices
It is important to take regular backups of both
data and programs for security purposes.
Floppy disks do not have a very high storage
capacity and so are seldom used for backup.
Instead higher capacity and faster storage
devices are used and main ones are as follows
Tape streamers
Zip drives
Jaz drives
17
Tape streamers
Are devices used to backup the data contained
on hard drives

Zip Drives
Are useful for backing up hard drives
They are high storage capacity floppy disks
which are slightly larger and twice as thick as
normal floppies
They can typical store data 100 MB or 250 MB
18
Jaz Drives
Is a removable disk drive which is very
fast at transferring data.
Each disk hold up to 2 GB of data
The higher data transfer rate means that
they can be used to backup data in a very
short time
They can be used for everyday storage
just like an ordinary disk drive
19

More Related Content

What's hot

Storage Devices PPt For class 9
Storage Devices PPt For class 9Storage Devices PPt For class 9
Storage Devices PPt For class 9
Saurabh Singh
 
memory and storage devices
memory and storage devicesmemory and storage devices
memory and storage devices
Mahak shahbaz
 
Storage devices
Storage devicesStorage devices
Storage devices
latifah2001
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
Ashish Kumar
 
storage devices
storage devicesstorage devices
storage devices
Momina Mateen
 
Secondary storage devices
Secondary storage devices Secondary storage devices
Secondary storage devices
Slideshare
 
Storage Device
Storage DeviceStorage Device
Storage Device
Neena Thanasaenchok
 
storage devices
storage devicesstorage devices
storage devices
luisduenas36
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
Shubham Nahar
 
Storage devices
Storage devicesStorage devices
Storage devices
Sandeep Kumawat
 
Storage devices
Storage devicesStorage devices
Storage devices
AtharvaLakhe
 
Storage Devices Presentation
Storage Devices PresentationStorage Devices Presentation
Storage Devices Presentation
Saharat
 
Secondary Memory
Secondary MemorySecondary Memory
Secondary Memory
Himanshu Gupta
 
Primary and secondary Storage devices
Primary and secondary Storage devicesPrimary and secondary Storage devices
Primary and secondary Storage devices
Muhammad Usman
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
TANISH KHURANA
 
STORAGE DEVICES
STORAGE DEVICESSTORAGE DEVICES
STORAGE DEVICES
Zaheer Abbasi
 
Storage devices
Storage devicesStorage devices
Secondary memory
Secondary memorySecondary memory
Secondary memory
University of Potsdam
 
secondary storage devices
secondary storage devicessecondary storage devices
secondary storage devices
Srijan Jaiswal
 
storage devices and its types
 storage devices and its types storage devices and its types
storage devices and its types
sabin kafle
 

What's hot (20)

Storage Devices PPt For class 9
Storage Devices PPt For class 9Storage Devices PPt For class 9
Storage Devices PPt For class 9
 
memory and storage devices
memory and storage devicesmemory and storage devices
memory and storage devices
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
 
storage devices
storage devicesstorage devices
storage devices
 
Secondary storage devices
Secondary storage devices Secondary storage devices
Secondary storage devices
 
Storage Device
Storage DeviceStorage Device
Storage Device
 
storage devices
storage devicesstorage devices
storage devices
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Storage Devices Presentation
Storage Devices PresentationStorage Devices Presentation
Storage Devices Presentation
 
Secondary Memory
Secondary MemorySecondary Memory
Secondary Memory
 
Primary and secondary Storage devices
Primary and secondary Storage devicesPrimary and secondary Storage devices
Primary and secondary Storage devices
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
 
STORAGE DEVICES
STORAGE DEVICESSTORAGE DEVICES
STORAGE DEVICES
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
secondary storage devices
secondary storage devicessecondary storage devices
secondary storage devices
 
storage devices and its types
 storage devices and its types storage devices and its types
storage devices and its types
 

Similar to Storing data ch 4

Storage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxStorage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptx
MalikAtiq4
 
Computer memory
Computer memoryComputer memory
Computer memory
Mrjonesit
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
Afaq Siddiqui
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devises
devaki123
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
Raj vardhan
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
Ritu Jhalani
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
Pichano Kikon
 
Storage Devices .docx
Storage Devices                    .docxStorage Devices                    .docx
Storage Devices .docx
Kamran Abdullah
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
Swarnima Tiwari
 
Memory 02
Memory 02Memory 02
Memory 02
ZTE Nepal
 
Cmp
CmpCmp
Computer Hardwares for Class 1
Computer Hardwares for Class 1Computer Hardwares for Class 1
Computer Hardwares for Class 1
Faisal Gulzar
 
Memory
MemoryMemory
Memory
Saleem Mahar
 
computer storage
computer storagecomputer storage
computer storage
Dipankar Dutta
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
julitolosbanos
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
aaravSingh41
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
Saurabhpatel347007
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
SriShailam5
 
Data storage
Data storageData storage
Data storage
tonysusu
 
Chapter1 9-07
Chapter1 9-07Chapter1 9-07
Chapter1 9-07
dereennn
 

Similar to Storing data ch 4 (20)

Storage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxStorage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptx
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devises
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
 
Storage Devices .docx
Storage Devices                    .docxStorage Devices                    .docx
Storage Devices .docx
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
 
Memory 02
Memory 02Memory 02
Memory 02
 
Cmp
CmpCmp
Cmp
 
Computer Hardwares for Class 1
Computer Hardwares for Class 1Computer Hardwares for Class 1
Computer Hardwares for Class 1
 
Memory
MemoryMemory
Memory
 
computer storage
computer storagecomputer storage
computer storage
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
 
Data storage
Data storageData storage
Data storage
 
Chapter1 9-07
Chapter1 9-07Chapter1 9-07
Chapter1 9-07
 

More from Khan Yousafzai

14 data logging
14   data logging14   data logging
14 data logging
Khan Yousafzai
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
Khan Yousafzai
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
Khan Yousafzai
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
Khan Yousafzai
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
Khan Yousafzai
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
Khan Yousafzai
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
Khan Yousafzai
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
Khan Yousafzai
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
Khan Yousafzai
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
Khan Yousafzai
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
Khan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
Khan Yousafzai
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
Khan Yousafzai
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
Khan Yousafzai
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
Khan Yousafzai
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
Khan Yousafzai
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
Khan Yousafzai
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
Khan Yousafzai
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
Khan Yousafzai
 
23 simulations
23   simulations23   simulations
23 simulations
Khan Yousafzai
 

More from Khan Yousafzai (20)

14 data logging
14   data logging14   data logging
14 data logging
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
 
23 simulations
23   simulations23   simulations
23 simulations
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Storing data ch 4

  • 2. Storage of Data Instructions and data are held in main memory which is divided into millions of addressable storage units called bytes. One byte can hold one character One byte can hold 8 bits Computers work by using pulses of voltage which represent either 1 or 0 A low voltage mean 0 and high voltage mean 1 Total bytes in main memory referred to as the computer’s memory size. 2
  • 3. Bits Computers use electronic circuits to perform the tasks they are programmed to complete. These circuits can be in one of two states - ‘On’ or ‘Off’. 3
  • 4. Memory Sizes measurement I nibble = 4 bits I byte = 8 bits I kilobytes (kb) = 1024 bytes 1 Megabytes (Mb) = 1024kilobytes 1 gigabytes (Gb) = 1024Megabytes 1 terabytes (TB) = 1024Gigabytes 4
  • 5. Memory ( Main store)  Memory is the name given to the group of chips inside the processing unit  The data held in the memory is available to the computer Memory is used to hold following information  Programs  Input data  Working Area  Output data  There are two types of main memory  Ram (Random access memory )  ROM (Read only memory ) 5
  • 6. RAM & ROM Ram ROM Its temporary memory Its Permanent memory Read and Write data It can only be read Data can be changed Data can not change or deleted or deleted It is a Volatile memory It is non Volatile The instructions are The instructions written into Rom at written in Ram at the manufacturing time. time of execution (BIOS) 6
  • 8. PROM & EPROM PROM  Programmable read only memory  User can write instruction only one time  Instructions can not be erased  If there is error while writing on PROM ,it becomes unusable EPROM  Erasable programmable Rom  User can write instruction many times  Instructions can be erased  If there is error while writing on EPROM, it can still be used again 8
  • 9. SRAM & DRAM SRAM Static Random Access Memory It can store its value without any need to refresh the data as long as the power is available It utilizes less power It is more expansive DRAM Dynamic Random Access Memory It has to be refreshed after each read operation. It utilizes more power It is less expansive 9
  • 10. Floppy Disk Used to transfer small amount of data between computers Come with 3.5 inch disk drive Floppy disk is the hard case the disk inside in floppy Magnetic disk store binary data as a magnetic pattern on the disk surface It hold 1.44MB of data Before the data is stored on a disk the disk needs to be formatted 10
  • 11. Hard drives  Consist a several disks on a single spindle  Each disk surface able to store data  Each surface can have its own read/write head  This enables the read/write heads to operate simultaneously which means that the data can be transferred more quickly than by using the large disk  Hard disk is available in all sorts of sizes  A typical computer will have a hard disk capacity of around 20 GB 11
  • 13. Magnetic Tape Large spools of tape are used very large computer systems that need to hold huge amount of data They are not as common as they used to be They look similar to audio cassettes except they are larger Their main use is for making backup copies of hard disk 13
  • 14. CD-ROM Drives Use the same technology as music CD and CD players The data is stored on the disk digitally and a laser beam is used to read the disk Light is used to read the disk the data may be packed closely and disk therefore has a huge capacity Are included in multimedia system CD-ROMs can be filled with clip art ,encyclopedia ,photograph and all sort of data Are read only disk A CD holds around 600MB data 14
  • 15. CD-R A CD recordable (CD-R) drive has a read/write capability. Using this device you can write around 15 minutes CD-R can be used to back up hard drives. Standard CD-R disks can be written to only once but there is a type of disks can be written, erased and rewritten They are more expensive than CD-R disks 15
  • 16. Digital Versatile Disks (DVD)  Are similar to CD-ROMs in that they look identical and are used to store lots of date.  Like CD-ROM they can be used to store computer application software, multimedia programs and full length movies  This is because CD-Rom typically store 650 MB of data whereas to a DVD stores between 4.7 GB  DVDs also are used to store movies where they produce much better quality pictures and sound compared to a normal video tape.  A film stored on DVD can even be made to offer the viewer a choice of several languages in which it can be played back 16
  • 17. Backup devices It is important to take regular backups of both data and programs for security purposes. Floppy disks do not have a very high storage capacity and so are seldom used for backup. Instead higher capacity and faster storage devices are used and main ones are as follows Tape streamers Zip drives Jaz drives 17
  • 18. Tape streamers Are devices used to backup the data contained on hard drives Zip Drives Are useful for backing up hard drives They are high storage capacity floppy disks which are slightly larger and twice as thick as normal floppies They can typical store data 100 MB or 250 MB 18
  • 19. Jaz Drives Is a removable disk drive which is very fast at transferring data. Each disk hold up to 2 GB of data The higher data transfer rate means that they can be used to backup data in a very short time They can be used for everyday storage just like an ordinary disk drive 19