Read only memory (rom), Basic Computer Science

Assignment Help:

Read only memory (rom):

The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent memory that never forgets its data.  One type of non-volatile memory is the Read Only Memory (ROM).  A ROM has a pattern of 0s and 1s imprinted in its memory by the manufacturer.  It is not possible to write new data into a ROM, which is why it is called a Read-Only Memory.

The organisation of data in a ROM is similar to that of a RAM.  Thus a 256-bit ROM might be organised as a 256 X 4-bit memory, and so on.  The ROM may be regarded as the "Reference Library" of a computer.

 


Related Discussions:- Read only memory (rom)

Computer Literacy Assignment Task, Assignment Task: You are required to dev...

Assignment Task: You are required to develop working solutions in Excel that will manage the annual budget, current month’s inventory, and a list of the current month’s transaction

System software, System software: System software helps run the  compu...

System software: System software helps run the  computer hardware and system. It is designed to control the operations of a computer and coordinate all external devices like c

Data type, Data Type:  Data Type: Anything that is processed by a comp...

Data Type:  Data Type: Anything that is processed by a computer is called data. There are different types of data that can be given to the computer for processing. A  data typ

Data buses, Data buses: The availability of reliable digital semi-condu...

Data buses: The availability of reliable digital semi-conductor technology has enabled the inter-communication task between different equipment to be significantly improved. P

Application packages, APPLICATION PACKAGES : There are two options. You ca...

APPLICATION PACKAGES : There are two options. You can either write your own program or buy an applications package, i.e. a proprietary program, 'off-the-shelf. The former option i

Create a database in access, The following are required: Create a ...

The following are required: Create a project in Access.  Your database must have flow and a theme. The database must be normalized.  The content m

What is vpn? explain the vpn protocols, Question 1 What is IT auditing? Di...

Question 1 What is IT auditing? Discuss the three phases involved in the IT auditing Question 2 List and explain the two types of load balancing methods Question 3

Introduction to FCB , There are two kinds of FCB, the normal, whose length...

There are two kinds of FCB, the normal, whose length is 37 bytes and the expanded one of 44 bytes. The FCB is created of data given by the programmer and by data which it takes dir

Info Systems Management, Assignment 1: Project Management and Information ...

Assignment 1: Project Management and Information Security 2-3 page paper in which you: 1. Explicate in detail the importance of project management as it relate to an informatio

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd