What is shadow ram, Computer Engineering

Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a particular area of random access memory (RAM) so that they can be accessed more rapidly. Access in shadow RAM is typically in the 60-100 nanosecond range while ROM access is in the 125-250 ns range. In some operating systems like DOS, certain BIOS routines are not only used during the boot or start-up of the system, but also during normal operation, particularly to drive the video display terminal. In Windows and OS/2, thus, these routines are not used and the use of shadow RAM is not essential. In some systems, the user can turn the use of shadow RAM off or on.       

 

 

Posted Date: 4/6/2013 5:34:52 AM | Location : United States







Related Discussions:- What is shadow ram, Assignment Help, Ask Question on What is shadow ram, Get Answer, Expert's Help, What is shadow ram Discussions

Write discussion on What is shadow ram
Your posts are moderated
Related Questions
Relocatable programs? Ans. Relocatable programs can be loaded almost anywhere inside the memory.

Ask qurecurrion for short noteestion

Determine the Object oriented principles Many latest applications are being developed based on object oriented principles such as methods, classes, and inheritance. To fulfil

Q. Steps uesd in quine mckluskey method? Step I: Build a table in that every term of expression is represented in row (Expression must be in SOP form). Terms can be expres

The Concept of Thread Thread is a chronological flow of control within a process. A process can include one or more threads. Threads have their own register values and program

Q. Explain about Algebraic Simplification? We have already determined algebraic simplification of logic circuit. An algebraic expression can exist in SOP or POS forms.  Let's i

Distinguish between ROM, PROM, EPROM, EEPROM. Ans: ROM: It also called Read Only Memory is a Permanent Memory. The data is permanently stored and cannot be changed in Perm

What are the Digital certificates of hardware computations Digital certificates are highly dependent on hardware computations, it is essential that mechanisms are evolved to i

Q. Explain about Operand Address Calculation? In actual machines effective address can be a register address, memory or I/O port address. Register reference instructions for ex

Using Module-Instance Parameter: Parameter values can be overridden while a module is instantiated. New parameter values are passed at the time of module instantiation. Top-