What is random access memory, Computer Engineering

Assignment Help:

What is Random access memory (RAM)

This is a volatile memory (i.e. contents are lost when computer is switched off). A user can write or delete data and read the contents. Before a program can be ran it should first be loaded into RAM that allows CPU to access the program. Battery-backed RAMs overcome data loss on switching power off though are outside the scope of these booklets.

(NOTE: For completeness, it's worth mentioning that two types of RAM exist termed as SRAM (static RAM) and DRAM (dynamic RAM) - SRAM doesn't need to be constantly refreshed to retain its memory unlike DRAM. Also consider that computers use cache which is a part of memory made from SRAM. Memory caching works as programs generally access the same data or instructions over and over again. By retaining as much information as possible in SRAM, computer operates more quickly (cache is generally termed level 1, 2 or 3 (termed L1, L2 or L3)).

 


Related Discussions:- What is random access memory

Credit line, The Credit Line The Credit Line is a set of informational f...

The Credit Line The Credit Line is a set of informational facts usually found below or beside a picture of a work of art. Should the picture appear in a book, magazine, poster,

Define atomic directive in fortan, Q. Define Atomic Directive in FORTAN? ...

Q. Define Atomic Directive in FORTAN? Atomic directive guarantees a specific storage location is updated atomically rather than exposing it to odds of multiple simultaneous wri

Embedded software, Embedded Software Intelligent products have becom...

Embedded Software Intelligent products have become commonplace for all consumer and industrial market. Embedded software stays in read only memory and is utilised to control

Program testing and debugging, Program testing and debugging: Program ...

Program testing and debugging: Program testing is the method of checking program, to verify that it satisfies its needs and to detect errors. These errors can be of any type-

Methodology and data collection in e-commerce, Introduction Our resear...

Introduction Our research methodology requires gathering relevant data from the specified documents in order to analyze the material and arrive at more complete understanding

Equivalence between vhdl and c, Equivalence between VHDL and C? There i...

Equivalence between VHDL and C? There is concept of understanding in C there is structure.Based upon requirement structure provide facility to store collection of various data

Explain the access methods used in lans, Explain the access methods used in...

Explain the access methods used in LANs. Access methods utilized in LAN: i. Switched access: this is used in LANs which are assigned around CBXs. Electronic switching

Depth in cutoff search, Depth in Cutoff search: The depth is chosen in...

Depth in Cutoff search: The depth is chosen in advance to certify in which the agent does not capture much more long to choose a move: however, if it has longer, well then we

Differentiate between gateways and bridges, Differentiate between Gateways ...

Differentiate between Gateways and Bridges. A machine that connects a LAN to the Internet is termed as a gateway. The gateway machine is responsible for routing packets that ar

Example of the horizon problem, Example of the horizon problem: It is ...

Example of the horizon problem: It is also worth bearing in mind the horizon problem, however a game-playing agent cannot see much far satisfactory into the search space. Now

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd