Read only memory (rom), Basic Computer Science

Assignment Help:

Read only memory (rom):

The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent memory that never forgets its data.  One type of non-volatile memory is the Read Only Memory (ROM).  A ROM has a pattern of 0s and 1s imprinted in its memory by the manufacturer.  It is not possible to write new data into a ROM, which is why it is called a Read-Only Memory.

The organisation of data in a ROM is similar to that of a RAM.  Thus a 256-bit ROM might be organised as a 256 X 4-bit memory, and so on.  The ROM may be regarded as the "Reference Library" of a computer.

 


Related Discussions:- Read only memory (rom)

Basic concepts of Assembler language , Information Units In order for the P...

Information Units In order for the PC to process information, it is essential that this information be in unique cells called registers. The registers are sets of 8 or 16 flip-flop

Computer graphics, A scaling constant indicates an expansion of length

A scaling constant indicates an expansion of length

Artificial intelligence-representations/languages used, Many persons are ta...

Many persons are taught AI with the opening line: " The three most important things in AI are representation, representation and representation ". While selecting the method of

Socket, socket programming

socket programming

Memory unit of computer, Memory unit of computer: The Memory  unit is ...

Memory unit of computer: The Memory  unit is an important component of a computer where all the data and information are stored in the form  of binary digits (combination of 0

Hardware, Hardware Hardware includes the cable and a Hub/Switch that...

Hardware Hardware includes the cable and a Hub/Switch that will connect the participating computers together. Printers or any other peripherals connected to one computer can

operator, what is operator and operator associativel

what is operator and operator associatively

Methods of working with files, There are two methods to work with files, th...

There are two methods to work with files, the first one is through file control blocks or "FCB" and the second one is through communication channels, also identified as "handles".

N-ary relationships in database design, n-ary relationships in database des...

n-ary relationships in database design Each n-ary where n>2 relationship type is maped into a table name of the relationship works as the name of the table. The primary key of suc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd