Illustrate single in-line memory modules, Computer Engineering

Assignment Help:

Q. Illustrate Single In-line Memory Modules?

From early days of semiconductor memory till the early 1990s memory was manufactured, brought and installed as a single chip. Chip density went from 1K bits to 1M bits and beyond though every chip was a separate unit. Early PCs generally had empty sockets into that extra memory chips could be plugged if and when purchaser required them. At present a different arrangement is frequently used known as SIMM or DIMM.

A group of chips typically 8 to 16 is mounted on a small printed circuit board and sold as a unit. This unit is known as a SIMM or DIMM depending on whether it has a row of connectors on one side or both sides of board.

A typical SIMM configuration may have 8 chips with 32 megabits (4MB) each on SIMM. The whole module then holds 32MB. Many computers have room for 4 modules giving a total capacity of 128MB when employing 32MB SIMMs. The first SIMMs had 30 connectors and delivered 8 bits at an instance. The other connectors were addressing and control. A later SIMM had 72 connectors and delivered 32 bits at an instance. For a machine such as Pentium that expected 64-bits at once 72-connectors SIMMs were paired each one delivering half the bits required.


Related Discussions:- Illustrate single in-line memory modules

Show matrix multiplication problem, Q. Show Matrix Multiplication Problem? ...

Q. Show Matrix Multiplication Problem? Let there be 2 matrices M1 and M2 of sizes a x b and b x c correspondingly. If we multiply M1 and M2 product matrix O will be of size a x

Explain can we have constant volatile variable, Const and volatile keywords...

Const and volatile keywords should not be used together due to both are opposite in nature. A variable is declared as "const" means its value is not able to be altered but if i

Gather some ram data after system was powered off, (a) When a forensic exa...

(a) When a forensic examiner arrives at a crime scene, the first task done is referred to as "Incident Response". Summarize the different incident response tasks done in 10 steps.

Presumably for heightened tension - first-order logic, Presumably for heigh...

Presumably for heightened tension - first-order logic: As an aside, it's worth pointing out that - presumably for heightened tension - in most Sherlock Holmes books, the m

Show the features of collaboration systems, Q. What are basic features that...

Q. What are basic features that collaboration systems might have? ANSWER: Three basic features of collaboration systems are Web-conferencing, project management,

Explain the importance of computer architecture, Explain the importance of ...

Explain the importance of computer architecture Studying the architecture implies working on machine language programs. However, this isn't practical when we design a computer

Btree, What should the size of ''t'' in btree be depending on the hard disk...

What should the size of ''t'' in btree be depending on the hard disk size

Explain the term- hacking, Explain the term- Hacking    Use of passwor...

Explain the term- Hacking    Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s

#chemistry, Please explain the construction and working of calomel electrod...

Please explain the construction and working of calomel electrode..

What is skew, What is skew? Clock Skew: In circuit design, clock ske...

What is skew? Clock Skew: In circuit design, clock skew is a phenomenon within synchronous circuits wherein the clock signal (sent through the clock circuit) arrives at dive

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd