Memory access, Basic Computer Science

Assignment Help:

Memory access:

The use of semi-conductor memory elements (bistables) has been made possible by the use of large scale integrated circuits (LSI) which provide reliability, ease of application and good storage capacity per unit volume.  A disadvantage of such memories is that a power supply is needed to hold the information stored.  Batteries may be provided to prevent loss of memory in case of power failure.  This is not necessary for memories made up of ferrite cores. 

Typically, 15 elements are needed for one word, therefore for a 2,000 word RAM we would need 30,000 elements arranged in a three dimensional matrix.  Figure 12 shows a 9-word store, each word consisting of 3-bits. 

80_memory access.png

Computer Memory

If one wishes to read the word at address W5, the memory address register sends, by way of the X and Y drive and decode circuits, a 1-bit along wires X2 and Y2.  The contents of W5 are then read sequentially from least significant bit to most significant bit by the sense wire, which is connected to each of the 27 elements. 

As part of a general-purpose computer ROMs may be used to store information which is unchanged over most, if not all, of the operational life of the equipment.  If all the hardware of a computer is wired in using ROMs then we no longer have a general-purpose computer and hence have lost the inherent flexibility.  However, saving in circuitry results, and some degree of flexibility can be regained by having interchangeable ROMs mounted on printed circuit boards (PCB) which can be removed from and fitted to the computer. 


Related Discussions:- Memory access

Artificial intelligence-internal structure of agents, Internal Structure of...

Internal Structure of Agents We have looked at agents in conditions of their outside influences and behaviors: they take effort from the atmosphere and do lucid actions to chan

statistics, write a 2 page essay operational gaming and monte carlo simula...

write a 2 page essay operational gaming and monte carlo simulation

Write a long note on the types of charts, Question 1 Write a long note on ...

Question 1 Write a long note on the security features of Windows XP Question 2 Write a long note on computer peripherals, briefly describing some of the devices Question

C, wap to print padovan string in c

wap to print padovan string in c

Assignment 4: Cloud Computing to the Rescue, The cost of building and maint...

The cost of building and maintaining an organizational computing ecosystem has become a bigger part of most organizations’ budgets. Organizations have been looking for ways to redu

Readymade versus custom-made software, READYMADE VERSUS CUSTOM-MADE SOFTWAR...

READYMADE VERSUS CUSTOM-MADE SOFTWARE Nursing care software can be in two forms. Software can be custom-made with the help of a computer programmer, suited for a client with v

Debugging, Debugging Once a program has been written, it has to ...

Debugging Once a program has been written, it has to be tested first to ensure that it is free of errors. It is very normal that any program written will contain mistake

Define opportunity cost, Define opportunity cost The opportunity cost...

Define opportunity cost The opportunity cost of any commodity is defined as the cost of next best alternative, which has been sacrificed for producing the given commodity. Th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd