What is random access memory, Computer Engineering

Assignment Help:

What is Random access memory (RAM)

This is a volatile memory (i.e. contents are lost when computer is switched off). A user can write or delete data and read the contents. Before a program can be ran it should first be loaded into RAM that allows CPU to access the program. Battery-backed RAMs overcome data loss on switching power off though are outside the scope of these booklets.

(NOTE: For completeness, it's worth mentioning that two types of RAM exist termed as SRAM (static RAM) and DRAM (dynamic RAM) - SRAM doesn't need to be constantly refreshed to retain its memory unlike DRAM. Also consider that computers use cache which is a part of memory made from SRAM. Memory caching works as programs generally access the same data or instructions over and over again. By retaining as much information as possible in SRAM, computer operates more quickly (cache is generally termed level 1, 2 or 3 (termed L1, L2 or L3)).

 


Related Discussions:- What is random access memory

?????, c program??????????

c program??????????

How do you get workflow automation in e-business environment, How do you ge...

How do you get workflow automation into e-business environment? In order to run smoothly, organizations frequently standardize processes across the organization and support use

What is page frame, What is page frame? An area in the main memory that...

What is page frame? An area in the main memory that can hold single page is called as page frame.

What is a message passing system, Distributed System 1. What is a messa...

Distributed System 1. What is a message passing system? Discuss the desirable features of a message passing system. 2. Discuss the implementation of RPC Mechanism in detail.

No class can derive, Make a console application. Add class 'Account' having...

Make a console application. Add class 'Account' having variables as num (integer) name (String), bal (double), ac_code (byte). Describe four different constructors to initialize th

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Standards used for development of a system, Q. Standards used for developme...

Q. Standards used for development of a system? Documentation standards: It must be an ongoing activity at the time of system development life cycle.  Quality Standards:

Eight-stage process - conjunctive normal forms, Eight-stage process - Conju...

Eight-stage process - Conjunctive normal forms: Hence we notice the following eight-stage process converts any sentence with CNF as:  1.  Eliminate all arrow connectives by

Explain about threads model - programming model, Q. Explain about Threads M...

Q. Explain about Threads Model - programming model? In this model a single process can have many as well as concurrent execution paths. The main program is planned to run by na

What is open database connectivity, What is Open Database Connectivity (ODB...

What is Open Database Connectivity (ODBC) It happens that in addition to conventional or most popular database management systems, many companies go for proprietary software c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd