Read only memory (rom), Basic Computer Science

Assignment Help:

Read only memory (rom):

The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent memory that never forgets its data.  One type of non-volatile memory is the Read Only Memory (ROM).  A ROM has a pattern of 0s and 1s imprinted in its memory by the manufacturer.  It is not possible to write new data into a ROM, which is why it is called a Read-Only Memory.

The organisation of data in a ROM is similar to that of a RAM.  Thus a 256-bit ROM might be organised as a 256 X 4-bit memory, and so on.  The ROM may be regarded as the "Reference Library" of a computer.

 


Related Discussions:- Read only memory (rom)

Database design, design railway maintenance system. draw er diagram.

design railway maintenance system. draw er diagram.

Compare cisc with risc cpus, Question 1 Define the following terms        ...

Question 1 Define the following terms                           1) Pipelining 2) Super Pipelining 3) Dynamic Execution 4) Multiprocessing 5) Multimedia Extensions Question 2

Definition of Internal hardware interruptions, Internal interruptions are...

Internal interruptions are produced by convinced events which come during the execution of a program. These types of interruptions are handled on their totality by the hardware and

System software, SYSTEMS SOFTWARE Systems Software generally is ...

SYSTEMS SOFTWARE Systems Software generally is the software which control the computers and other peripherals. Ex: MS DOS, Windows 95, Unix, NetWare and Windows NT et

Programs, creating programs in scheme

creating programs in scheme

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Browser security, Browser Security: WWW is used for many applications ...

Browser Security: WWW is used for many applications today including Banking, reservation, trading,  e-commence and many such applications which require security and confidenti

Third generation of computers, THE THIRD GENERATION (1966-1975) ...

THE THIRD GENERATION (1966-1975) The introduction of IBM-360 series of computers in 1965 marked the beginning of this generation. The transistors were replaced by solid

Telecommunications, Telecommunications: 'Data communications', 'Commun...

Telecommunications: 'Data communications', 'Communications technology', 'Computer telecommunications', Compunications', 'Telecomputing', etc., are just some of the terms we co

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd