Memory, Basic Computer Science

Assignment Help:

Memory

The memory unit is used for the storage of binary coded information. Information consists of instructions and data where:

• Instructions are the coded pieces of information that direct the activities of the CPU.

• Data is the information that is processed by the CPU.

The memory hardware contains a large number of cells or locations. Each location may store a single binary digit or a group of binary digits. The cells are grouped so that a complete binary word is always accessed. Word length varies typically from 4-bits up to 64-bits depending upon machine size. Each location in the memory is identified by a unique address, which then allows access to the word. Consequently, to obtain information from the memory, the correct address must be placed onto the address bus.

There are fundamentally two types of memory - primary memory and secondary memory. Primary memory is essential; no computer can operate without this. Secondary memory is necessary to supplement, or back, the primary memory on large computing systems; hence, it is often called backing memory.

There are two types of semi-conductor primary memory: ROM (Read Only Memory) and RAM (Random Access memory). Both types employ solid state circuitry, and are packaged in IC form.

Figure shows how these primary memories are connected to a simple computer bus. 

323_memory.png

ROM and RAM Connection to Buses


Related Discussions:- Memory

Analyze the complexity of dijkstra''s algorithm, QUESTION (a) Given the...

QUESTION (a) Given the graph as shown in figure, apply Lagrangian technique to complete the table assuming μ=1 and T=14                        Path P

System software, note on high level language and low level language

note on high level language and low level language

BARCODES, WHY ISN''T THE PRICE STORED ON THE BARCODE

WHY ISN''T THE PRICE STORED ON THE BARCODE

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

C programming, input is n positive numbers and reverse it, out put gv the a...

input is n positive numbers and reverse it, out put gv the absolute difference and give the reverse(magic number),using function reverseinteger, and function generate magicnumber

Stack instructions, These instructions permit the use of the stack to store...

These instructions permit the use of the stack to store or recover data. POP POPF PUSH PUSHF POP INSTRUCTION Purpose: It improves a portion of information from the stack POPF INST

Breadth first search - artificial intelligence, Breadth First Search - arti...

Breadth First Search - artificial intelligence: Given a set of operators o1, ..., on in a breadth primary search, every time a new state s is reached, an action for every  oper

Android database file not loading on real device, i have an android app whi...

i have an android app which uses a database file called question db which is stored in the assets file. I have tried a database example called android application development but f

Java programming, what are the phases of oo progarmming or java?

what are the phases of oo progarmming or java?

Problem solving using a computer, PROBLEM SOLVING USING A COMPUTER The ...

PROBLEM SOLVING USING A COMPUTER The following steps are required for solving a problem using a computer system:     Problem Definition     Program Planning (Preparati

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd