Dram simm, Computer Engineering

Assignment Help:

 The most common type of non-volatile memory is the ROM device. This device is read only and the data is masked into the chip during manufacture. Variations of the ROM are one off programmable ones (PROM), erasable ones (EPROM) using UV light, electrical erasable ones (EEPROM). These devices allow the user to blow them with programs and re-program if incorrect. As engineers we will often use the EPROM version, the pinning details are shown below

481_DRAM SIMM.png

The internal structure of the EPROM is similar the SRAM, but does not require a write pin; it employs light sensitive fuses to hold the data.

The actual device has a window in it, this enables the device to be cleaned using UV light, usually this window is covered up to prevent slow eraser by normal light.


Related Discussions:- Dram simm

What is hard drive interface, Q. What is Hard Drive Interface? Secondar...

Q. What is Hard Drive Interface? Secondary storage devices need a controller to proceed as an intermediary between device and rest of the computer system. On some computers the

Grid security, i just want the experiment to be taken , on Grid Security......

i just want the experiment to be taken , on Grid Security........

Define relocation bits utilized by relocating loader, Relocation bits used ...

Relocation bits used by relocating loader are specified by? Ans. Relocation bits utilized by relocating loader are identified by Assembler or Translator.

Define the vbscript basics, VBScript is an easy and powerful to learn tool ...

VBScript is an easy and powerful to learn tool which can be used to add interaction to your Web pages. Web browser receives scripts along with rest of the Web document. Browser par

Ds, explain about relations

explain about relations

Processor, what is the difference between i5 and i7 processor?

what is the difference between i5 and i7 processor?

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

Demux., Implement the full substractor using 8:1demux

Implement the full substractor using 8:1demux

What are the end-to-end layers of osi structure, What are the end-to-end la...

What are the end-to-end layers of OSI structure? The layers 4 to 7 of ISO-OSI reference model communicate along with peer entities into the end systems. Now here is no communi

Common functions of interrupts - computer architecture, Common Functions of...

Common Functions of Interrupts: An Interrupt transfers control to the interrupt service routine, generally through the interrupt vector table, which contains the addresses

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd