Read only memory (rom), Basic Computer Science

Assignment Help:

Read only memory (rom):

The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent memory that never forgets its data.  One type of non-volatile memory is the Read Only Memory (ROM).  A ROM has a pattern of 0s and 1s imprinted in its memory by the manufacturer.  It is not possible to write new data into a ROM, which is why it is called a Read-Only Memory.

The organisation of data in a ROM is similar to that of a RAM.  Thus a 256-bit ROM might be organised as a 256 X 4-bit memory, and so on.  The ROM may be regarded as the "Reference Library" of a computer.

 


Related Discussions:- Read only memory (rom)

Java Assignment, Hi? are you conversant with Java that is J2SE 6 coz i have...

Hi? are you conversant with Java that is J2SE 6 coz i have assignments on this area?

C programming program, I wrote a program that adds up 5x5 matrices by colum...

I wrote a program that adds up 5x5 matrices by column and row. Now i have to use pointers to rewrite the same code how would do that

What features should the hospital software contain?, What Features Should t...

What Features Should the Software Contain? Although the needs of every nursing department, hospital, pharmacy, would vary, certain common features are desirable in the software

Microprocessor, what is computer mapped input / output

what is computer mapped input / output

Working principle of master slave j-k flip flop, Problem 1. Obtain the ...

Problem 1. Obtain the set of prime implicants for f = Σ m (0,1,6,7,8,9,13,14,15) . Obtaining the set of prime implicants: 2. Draw the logic diagram of a divide by

Concept of programming language, CONCEPT OF PROGRAMMING LANGUAGE: In o...

CONCEPT OF PROGRAMMING LANGUAGE: In order to communicate with other human beings, one needs some language or a medium. In the same way for solving problems, a programming  lan

Database, how does one create a database in mysql

how does one create a database in mysql

Cisc, two characteristics og CISC architecture?

two characteristics og CISC architecture?

HACKER, Briefly explain who a hacker is and what the activities of a hacker...

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Binary, Ask quwhat is binary estion #Minimum 100 words accepted#

Ask quwhat is binary estion #Minimum 100 words accepted#

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd