Memory, Basic Computer Science

Assignment Help:

Memory

The memory unit is used for the storage of binary coded information. Information consists of instructions and data where:

• Instructions are the coded pieces of information that direct the activities of the CPU.

• Data is the information that is processed by the CPU.

The memory hardware contains a large number of cells or locations. Each location may store a single binary digit or a group of binary digits. The cells are grouped so that a complete binary word is always accessed. Word length varies typically from 4-bits up to 64-bits depending upon machine size. Each location in the memory is identified by a unique address, which then allows access to the word. Consequently, to obtain information from the memory, the correct address must be placed onto the address bus.

There are fundamentally two types of memory - primary memory and secondary memory. Primary memory is essential; no computer can operate without this. Secondary memory is necessary to supplement, or back, the primary memory on large computing systems; hence, it is often called backing memory.

There are two types of semi-conductor primary memory: ROM (Read Only Memory) and RAM (Random Access memory). Both types employ solid state circuitry, and are packaged in IC form.

Figure shows how these primary memories are connected to a simple computer bus. 

323_memory.png

ROM and RAM Connection to Buses


Related Discussions:- Memory

Ipv4 and ipv6, IPv6 documented in 1994 (RFC 1752) is still a collection...

IPv6 documented in 1994 (RFC 1752) is still a collection of Draft and Proposed standards Several pre-standard implementations exist IPv6 was intended to be a pragmatic up

Syntax - programming language, Syntax: Syntax provides the structure a...

Syntax: Syntax provides the structure and how to formulate the phrase or sentence w.r.t grammar of the language. It tells us about which composition is allowed from the charac

Perverse software, is u given is enough for us for this - what is pervere ...

is u given is enough for us for this - what is pervere software and explain in detail?

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Project, how to set up the location (e.g. plaza, hall of fame, lecture thea...

how to set up the location (e.g. plaza, hall of fame, lecture theater or etc.) and services that will be used during the exhibition; devices needed; and finally produced a compreh

Why learning of Assembly language is beneficial?, The first reason to work ...

The first reason to work with assembler is that it offers the opportunity of knowing more the operation of your PC, which permits the development of software in a more constant man

Unix Shell, Write a shell script, change-lines, which will substitute a str...

Write a shell script, change-lines, which will substitute a string for a replacement string for each occurance of the string in files specified. The original file will be saved,

Algorithm, solve three given number in ascending order through algorithm

solve three given number in ascending order through algorithm

Protocol, what protocol is used by DNS name server

what protocol is used by DNS name server

What is the intent of the singleton pattern, QUESTION Consider a Univer...

QUESTION Consider a University system which has several sub systems: Student Registration Module Registration Time Tabling Library System Human Resource Manag

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd