SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
UKWIMI TRADES TRAINING
INSTITUTE
COMPUTER APPLICATION
TERM 2 – SESSION 9
TOPIC COVERED TODAY:
• MEMORY OF THE COMPUTER
• Units of memory
• The different units of measurement
• Conversion
• Types of Memory
• Primary Memory
• RAM
• ROM
• Secondary memory
MEMORY OF THE COMPUTER
• Memory or storage capacity is one of the important components of a
computer.
• Any storage unit of a computer system is classified on the basis of the
following criteria:
• 1. Access time: This is the time required to locate and retrieve stored
data from the storage unit in response to program instructions.
• 2. Storage capacity: It is the amount of data that can be stored in the
storage unit.
• 3. Cost per bit of storage.
Units of memory
• The computer stores a character in the storage cells with binary (0,1)
mechanism.
• Thus the basic unit of memory is a bit (binary digit – 0,1).
• To store a character, a computer requires 8 bits or 1 byte.
• This is called the ― word length of the storage unit.
• Hence the storage capacity of the computer is measured in the
number of words it can store and is expressed in terms of bytes.
The different units of measurement are:
Conversion
• ASCII – American Standard Code for Information Interchange.
• This code has given alphabets like some numbers which can be
converted to Binary form.
• The following is a link to access the full ASCII table
ASCII table - Table of ASCII codes, characters and symbols (ascii-
code.com)
Types of Memory
A computer memory is of two types
• 1. Primary Memory ( Internal storage)
• 2. Secondary Memory ( External storage)
Primary Memory
• Primary memory is also called internal memory and is an important
part of a computer.
• It is the main area in a computer where the data is stored.
• The stored data can be recalled instantly and correctly whenever
desired.
• This memory can be quickly accessed by the CPU for reading
or storing information.
• Primary memory is further classified into two types:
• Random Access Memory (RAM)
• and Read- Only Memory (ROM )
RAM:
• RAM is also known as read/write memory as information can be read
from and written onto it.
• RAM is a place in a computer that holds instructions for the computer,
its programs and the data.
• The CPU can directly access the data from RAM almost immediately.
• However, the storage of data and instructions in RAM is temporary, till
the time the computer is running.
• It disappears from RAM as soon as the power to the computer is
switched off. i.e it is volatile memory.
ROM
• It is called Read-only memory as information can only be read from
and not written or changed onto ROM.
• ROM is the ‘built-in‘ memory of a computer. It stores some basic
input – output instructions put by the manufacturer to operate the
computer.
• The storage of data and instructions in ROM is permanent.
• It does not depend on the power supply. i.e it is non-volatile memory.
Secondary memory
• The primary memory which is faster (and hence expensive) is generally not
sufficient for large storage of data.
• As a result, additional memory, called the ‘axiliary’ or ‘secondary memory’
is used.
• It is also referred as ‘backup storage’ as it is used to store large volume of
data on a permanent basis which can be transferred to the primary
memory whenever required for processing.
• Data are stored in secondary storage in the same binary codes as in the
main (primary memory) storage.
• Some of the devices of secondary storages are Floppy Disk, Hard Disk, CD-
ROM, DVD and Flash drive.

Mais conteúdo relacionado

Semelhante a SESSION 9 - Storage on the computer .pdf

5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptxKunalGola6
 
TYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESTYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESShahbaz Baloch
 
Exploring Of System Hardware
Exploring Of System HardwareExploring Of System Hardware
Exploring Of System HardwareMuhammad Nauman
 
computer architecture and organisation
computer architecture and organisationcomputer architecture and organisation
computer architecture and organisationRamjiChaurasiya
 
Presentacion pujol
Presentacion pujolPresentacion pujol
Presentacion pujolDylan Real G
 
Memory & its types presentation1
Memory & its types presentation1Memory & its types presentation1
Memory & its types presentation1JAI BAMORIYA
 
Introduction to Types of Memory Chips
Introduction to Types of Memory ChipsIntroduction to Types of Memory Chips
Introduction to Types of Memory ChipsMahe Karim
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitRai University
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unitRai University
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitRai University
 
Memory Organisation.pptx
Memory Organisation.pptxMemory Organisation.pptx
Memory Organisation.pptxBtechlife
 

Semelhante a SESSION 9 - Storage on the computer .pdf (20)

5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptx
 
Ram & rom
Ram & romRam & rom
Ram & rom
 
TYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESTYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIES
 
Exploring Of System Hardware
Exploring Of System HardwareExploring Of System Hardware
Exploring Of System Hardware
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
computer architecture and organisation
computer architecture and organisationcomputer architecture and organisation
computer architecture and organisation
 
Presentacion pujol
Presentacion pujolPresentacion pujol
Presentacion pujol
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Memory & its types presentation1
Memory & its types presentation1Memory & its types presentation1
Memory & its types presentation1
 
Introduction to Types of Memory Chips
Introduction to Types of Memory ChipsIntroduction to Types of Memory Chips
Introduction to Types of Memory Chips
 
Primary Memories.pptx
Primary Memories.pptxPrimary Memories.pptx
Primary Memories.pptx
 
coa memories
coa memoriescoa memories
coa memories
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
 
Intro computers
Intro computersIntro computers
Intro computers
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unit
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptx
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
 
Internal storage devices
Internal storage devicesInternal storage devices
Internal storage devices
 
Memory Unit
Memory UnitMemory Unit
Memory Unit
 
Memory Organisation.pptx
Memory Organisation.pptxMemory Organisation.pptx
Memory Organisation.pptx
 

Mais de Maxwell Musonda

SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...Maxwell Musonda
 
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdfSESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdfMaxwell Musonda
 
SESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdfSESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdfMaxwell Musonda
 
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdfSESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdfMaxwell Musonda
 
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdfSESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdfMaxwell Musonda
 
SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...Maxwell Musonda
 
Lecture 10 using powerpoint and project presentations
Lecture 10   using powerpoint and project presentationsLecture 10   using powerpoint and project presentations
Lecture 10 using powerpoint and project presentationsMaxwell Musonda
 
Lec ture 9 using the internet
Lec ture 9   using the internetLec ture 9   using the internet
Lec ture 9 using the internetMaxwell Musonda
 
Lecture 8 using spreadsheet
Lecture 8   using spreadsheetLecture 8   using spreadsheet
Lecture 8 using spreadsheetMaxwell Musonda
 
Lecture 5 sending and receiving e-mail
Lecture 5   sending and receiving e-mailLecture 5   sending and receiving e-mail
Lecture 5 sending and receiving e-mailMaxwell Musonda
 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mailMaxwell Musonda
 
Lecture 3 use word processing for technical report
Lecture 3   use word processing for technical report Lecture 3   use word processing for technical report
Lecture 3 use word processing for technical report Maxwell Musonda
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating systemMaxwell Musonda
 
Lecture 1 operate a computer system
Lecture 1   operate a computer systemLecture 1   operate a computer system
Lecture 1 operate a computer systemMaxwell Musonda
 

Mais de Maxwell Musonda (14)

SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
 
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdfSESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
 
SESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdfSESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdf
 
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdfSESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
 
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdfSESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
 
SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...
 
Lecture 10 using powerpoint and project presentations
Lecture 10   using powerpoint and project presentationsLecture 10   using powerpoint and project presentations
Lecture 10 using powerpoint and project presentations
 
Lec ture 9 using the internet
Lec ture 9   using the internetLec ture 9   using the internet
Lec ture 9 using the internet
 
Lecture 8 using spreadsheet
Lecture 8   using spreadsheetLecture 8   using spreadsheet
Lecture 8 using spreadsheet
 
Lecture 5 sending and receiving e-mail
Lecture 5   sending and receiving e-mailLecture 5   sending and receiving e-mail
Lecture 5 sending and receiving e-mail
 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mail
 
Lecture 3 use word processing for technical report
Lecture 3   use word processing for technical report Lecture 3   use word processing for technical report
Lecture 3 use word processing for technical report
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
 
Lecture 1 operate a computer system
Lecture 1   operate a computer systemLecture 1   operate a computer system
Lecture 1 operate a computer system
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

SESSION 9 - Storage on the computer .pdf

  • 1. UKWIMI TRADES TRAINING INSTITUTE COMPUTER APPLICATION TERM 2 – SESSION 9
  • 2. TOPIC COVERED TODAY: • MEMORY OF THE COMPUTER • Units of memory • The different units of measurement • Conversion • Types of Memory • Primary Memory • RAM • ROM • Secondary memory
  • 3. MEMORY OF THE COMPUTER • Memory or storage capacity is one of the important components of a computer. • Any storage unit of a computer system is classified on the basis of the following criteria: • 1. Access time: This is the time required to locate and retrieve stored data from the storage unit in response to program instructions. • 2. Storage capacity: It is the amount of data that can be stored in the storage unit. • 3. Cost per bit of storage.
  • 4. Units of memory • The computer stores a character in the storage cells with binary (0,1) mechanism. • Thus the basic unit of memory is a bit (binary digit – 0,1). • To store a character, a computer requires 8 bits or 1 byte. • This is called the ― word length of the storage unit. • Hence the storage capacity of the computer is measured in the number of words it can store and is expressed in terms of bytes.
  • 5. The different units of measurement are:
  • 6. Conversion • ASCII – American Standard Code for Information Interchange. • This code has given alphabets like some numbers which can be converted to Binary form. • The following is a link to access the full ASCII table ASCII table - Table of ASCII codes, characters and symbols (ascii- code.com)
  • 7.
  • 8.
  • 9. Types of Memory A computer memory is of two types • 1. Primary Memory ( Internal storage) • 2. Secondary Memory ( External storage)
  • 10. Primary Memory • Primary memory is also called internal memory and is an important part of a computer. • It is the main area in a computer where the data is stored. • The stored data can be recalled instantly and correctly whenever desired. • This memory can be quickly accessed by the CPU for reading or storing information.
  • 11. • Primary memory is further classified into two types: • Random Access Memory (RAM) • and Read- Only Memory (ROM )
  • 12. RAM: • RAM is also known as read/write memory as information can be read from and written onto it. • RAM is a place in a computer that holds instructions for the computer, its programs and the data. • The CPU can directly access the data from RAM almost immediately. • However, the storage of data and instructions in RAM is temporary, till the time the computer is running. • It disappears from RAM as soon as the power to the computer is switched off. i.e it is volatile memory.
  • 13.
  • 14.
  • 15. ROM • It is called Read-only memory as information can only be read from and not written or changed onto ROM. • ROM is the ‘built-in‘ memory of a computer. It stores some basic input – output instructions put by the manufacturer to operate the computer. • The storage of data and instructions in ROM is permanent. • It does not depend on the power supply. i.e it is non-volatile memory.
  • 16. Secondary memory • The primary memory which is faster (and hence expensive) is generally not sufficient for large storage of data. • As a result, additional memory, called the ‘axiliary’ or ‘secondary memory’ is used. • It is also referred as ‘backup storage’ as it is used to store large volume of data on a permanent basis which can be transferred to the primary memory whenever required for processing. • Data are stored in secondary storage in the same binary codes as in the main (primary memory) storage. • Some of the devices of secondary storages are Floppy Disk, Hard Disk, CD- ROM, DVD and Flash drive.