Read only memory (rom), Basic Computer Science

Assignment Help:

Read only memory (rom):

The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent memory that never forgets its data.  One type of non-volatile memory is the Read Only Memory (ROM).  A ROM has a pattern of 0s and 1s imprinted in its memory by the manufacturer.  It is not possible to write new data into a ROM, which is why it is called a Read-Only Memory.

The organisation of data in a ROM is similar to that of a RAM.  Thus a 256-bit ROM might be organised as a 256 X 4-bit memory, and so on.  The ROM may be regarded as the "Reference Library" of a computer.

 


Related Discussions:- Read only memory (rom)

Hardware, Hardware Hardware includes the cable and a Hub/Switch that...

Hardware Hardware includes the cable and a Hub/Switch that will connect the participating computers together. Printers or any other peripherals connected to one computer can

Write a long note letters to the editor, Question 1 What is meant by typog...

Question 1 What is meant by typography? Describe the process in which one can choose and use type Question 2 What is investigative reporting? Write a long note Question 3

Understanding human intelligence in social, Understanding human intelligenc...

Understanding human intelligence in social AI can be taken as just the current tool in the philosopher's toolbox for answering of questions for the behaviour of human intellig

Product of first n natural numbers-algorithm, Product of first n natural nu...

Product of first n natural numbers - Algorithm Working Procedure : 1. Take n = 8 2. Take I = 1 3. Take PROD = 1 4. Compute PROD = PROD * 1 5. add 1 to 1 6. If I≤ n, complete

Telecommunication protocols, TELECOMMUNICATION PROTOCOLS: The two majo...

TELECOMMUNICATION PROTOCOLS: The two major components relating to a WAN are the Protocol and the Media. The media are the actual path ways that the protocol travels on. The ne

Simulated annealing-artificial intelligence, Simulated Annealing One wa...

Simulated Annealing One way to answer the problem of local maxima and related problems like ridges and plateaux in hill climbing is to permit the agent to go downhill to some e

Explain web cache, To satisfy client needs through proxy server and not thr...

To satisfy client needs through proxy server and not through main server, as some other user have already accessed that file and its copied to the proxy server, so next time a user

File management, File Management:   The concept of a file is central t...

File Management:   The concept of a file is central to the effective use of a computer system. A file is generally loosely defined as a collection of related information such

D, #questionWrite a program to find the area under the curve y = f(x) betwe...

#questionWrite a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two poi

Information security, can someone balance between information security and ...

can someone balance between information security and access, if yes,how can they balance?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd