SlideShare a Scribd company logo
1 of 5
 
RAM  RANDOM ACCESS MEMORY:  The personal computer memory module is a piece of hardware that allows stored data to be accessed randomly. Its main function is to store the data temporarily.
First Open the DIMM slot clips then position the memory card.
Align the module with the slot, making sure the groove on the module lines up with the notch on the slot.
Without forcing anything, slide the module into the DIMM slot and push down evenly on each corner until both clips snap shut. This may require some force so check that you have the module aligned with the slot correctly before pushing hard.

More Related Content

Viewers also liked

Viewers also liked (11)

南海大餐pdf
南海大餐pdf南海大餐pdf
南海大餐pdf
 
Доклад Меты на КМФР 2010
Доклад Меты на КМФР 2010Доклад Меты на КМФР 2010
Доклад Меты на КМФР 2010
 
1006 DPRK Agriculture Program: SRI Project in four local farms
1006 DPRK Agriculture Program: SRI Project in four local farms1006 DPRK Agriculture Program: SRI Project in four local farms
1006 DPRK Agriculture Program: SRI Project in four local farms
 
Web / Graphic design credentials
Web / Graphic design credentialsWeb / Graphic design credentials
Web / Graphic design credentials
 
Acts of being in proxies for prints: People in the Catalogue of Political and...
Acts of being in proxies for prints: People in the Catalogue of Political and...Acts of being in proxies for prints: People in the Catalogue of Political and...
Acts of being in proxies for prints: People in the Catalogue of Political and...
 
Wintereinbruch
WintereinbruchWintereinbruch
Wintereinbruch
 
Estilos de-aprendizajes-valeria
Estilos de-aprendizajes-valeriaEstilos de-aprendizajes-valeria
Estilos de-aprendizajes-valeria
 
F5 Grabbing the Tail of the Tiger: Making a K–16 Partnership Work (Brzezinski)
F5 Grabbing the Tail of the Tiger: Making a K–16 Partnership Work (Brzezinski)F5 Grabbing the Tail of the Tiger: Making a K–16 Partnership Work (Brzezinski)
F5 Grabbing the Tail of the Tiger: Making a K–16 Partnership Work (Brzezinski)
 
T4 A Multi-Model Approach to Chinese Language Teacher Preparation
T4 A Multi-Model Approach to Chinese Language Teacher Preparation T4 A Multi-Model Approach to Chinese Language Teacher Preparation
T4 A Multi-Model Approach to Chinese Language Teacher Preparation
 
distribution company logo
distribution company logodistribution company logo
distribution company logo
 
Barcodes & Your Business
Barcodes & Your BusinessBarcodes & Your Business
Barcodes & Your Business
 

More from kapitanbasa

Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
kapitanbasa
 
Cross over cabling
Cross over cablingCross over cabling
Cross over cabling
kapitanbasa
 
Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
kapitanbasa
 
How to connect keyboard to the system unit
How to connect keyboard to the system unitHow to connect keyboard to the system unit
How to connect keyboard to the system unit
kapitanbasa
 
Char of living things
Char of living thingsChar of living things
Char of living things
kapitanbasa
 
Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
kapitanbasa
 
Scientific method
Scientific methodScientific method
Scientific method
kapitanbasa
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
kapitanbasa
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
kapitanbasa
 
Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
kapitanbasa
 
Parts of system unit
Parts of system unitParts of system unit
Parts of system unit
kapitanbasa
 

More from kapitanbasa (20)

Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
 
Cross over cabling
Cross over cablingCross over cabling
Cross over cabling
 
Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
 
How to connect keyboard to the system unit
How to connect keyboard to the system unitHow to connect keyboard to the system unit
How to connect keyboard to the system unit
 
Char of living things
Char of living thingsChar of living things
Char of living things
 
Vistasetup
VistasetupVistasetup
Vistasetup
 
Win xp setup
Win xp setupWin xp setup
Win xp setup
 
The microscope
The microscopeThe microscope
The microscope
 
Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
 
Vistasetup
VistasetupVistasetup
Vistasetup
 
Win7setup
Win7setupWin7setup
Win7setup
 
Win xp setup
Win xp setupWin xp setup
Win xp setup
 
Scientific method
Scientific methodScientific method
Scientific method
 
Win2k
Win2kWin2k
Win2k
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Straight thru cabling
Straight thru cablingStraight thru cabling
Straight thru cabling
 
Parts of system unit
Parts of system unitParts of system unit
Parts of system unit
 
Stage3
Stage3Stage3
Stage3
 
Stage3
Stage3Stage3
Stage3
 

Recently uploaded

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Installing memory

  • 1.  
  • 2. RAM RANDOM ACCESS MEMORY: The personal computer memory module is a piece of hardware that allows stored data to be accessed randomly. Its main function is to store the data temporarily.
  • 3. First Open the DIMM slot clips then position the memory card.
  • 4. Align the module with the slot, making sure the groove on the module lines up with the notch on the slot.
  • 5. Without forcing anything, slide the module into the DIMM slot and push down evenly on each corner until both clips snap shut. This may require some force so check that you have the module aligned with the slot correctly before pushing hard.