SlideShare une entreprise Scribd logo
1  sur  15
Title of the presentation
Anjali G
anjalig2009@gmail.com
dwww.facebook.com/Anjali
Geetha
twitter.com/Anjali Geetha
in.linkedin.com/in/Anjali G
9497879952
DIFFERENT TYPES OF MEMORIES IN A COMPUTER INCLUDING
REGISTERS
INTRODUCTION
 Computer memory is any physical device capable of storing information
temporarily or permanently.
two types: volatile and non volatile
REPRESENTATION OF MEMORY
VOLATILE MEMORY
Volatile memory is a temporary memory that loses its contents when the computer or
hardware device loses power.
Computer RAM is a good example of a volatile memory
 Most modern volatile memory is either Static RAM or dynamic RAM.
SRAM:-
 SRAM uses six transistors per bit.
SRAM is faster and more reliable than the more common DRAM . While DRAM supports
access times of about 60 nanoseconds, SRAM can give access times as low as 10
nanoseconds.
Unfortunately SRAM is much more expensive to produce than DRAM. Due to its high
cost, SRAM is often used only as a memory cache.
SRAM is generally used for high-speed registers & caches.
A typical SRAM cell is made up of six MOSFET.
Each bit in an SRAM is stored on four
transistors(M1, M2, M3, M4) that form
two cross-coupled inverters.
Main Needs:
• to provide a direct interface with the CPU at speeds
not attainable by DRAMs
• to replace DRAMs in systems that require very
low power consumption.
DRAM:-
DRAM is a type of random-access memory that stores
each bit of data in a separate capacitor within an IC.
The capacitor can be either charged or discharged; these two states are taken to
represent the two values of a bit.
Dynamic RAM needs regular refresh cycles to prevent its contents being lost.
The advantage of DRAM is its structural simplicity: only one transistor and a capacitor are
required per bit, compared to four or six transistors in SRAM.
DRAM is usually arranged in a rectangular array of charge storage cells consisting of one
capacitor and transistor per data bit.
VIRTUAL MEMORY
When computer lacks RAM; needed to run a program
or operation Virtual memory is used.
Virtual memory combines your computer’s RAM with
temporary space on your hard disk.
The purpose of virtual memory is to enlarge the
address space, the set of addresses a program can utilize.
The operating system divides virtual memory into pages,
each of which contains a fixed number of addresses. Each page is stored on a disk until it is
needed.
When RAM runs low, virtual memory moves data from RAM to a space called a paging
file. Moving data to and from the paging file frees up RAM to complete its work.
OS is translating virtual addresses into real addresses.
The process of translating virtual addresses into real addresses is called mapping. The
copying of virtual pages from disk to main memory is known as paging.
NONVOLATILE MEMORY
Non-volatile memory is computer memory that can retain the stored information even
when not powered.
 Examples of non-volatile memory include read-only memory , flash memory, most types
of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape)
Read-only memory (ROM) is a class of storage medium used in computers and other
electronic devices. Data stored in ROM cannot be modified, or can be modified only slowly
or with difficulty, so it is mainly used to distribute firmware.
Flash memory is an electronic non-volatile computer storage device that can be
electrically erased and reprogrammed.
Flash memory was developed from EEPROM.
There are two main types of flash memory, which are named after
the NAND and NOR logic gates.
REGISTERS
A special, high-speed storage area within the CPU.
 All data must be represented in a register before it can be processed.
The number of registers that a CPU has and the size of each help determine the power
and speed of a CPU.
Only assembly language programs can manipulate registers.
Register performs:
1. Fetch: The Fetch Operation is used for taking the instructions those are given by the
user and the Instructions those are stored into the Main Memory will be fetch by using
Registers.
2. Decode: The Decode Operation is used for interpreting the Instructions means the
Instructions are decoded means the CPU will find out which Operation is to be
performed on the Instructions.
3. Execute: The Execute Operation is performed by the CPU. And Results those are
produced by the CPU are then Stored into the Memory and after that they are
displayed on the user Screen.
TYPES OF REGISTERS
Memory Address Register: -This register holds the memory addresses of data and
instructions. This register is used to access data and instructions from memory during the
execution phase of an instruction.
Program Counter:- The program counter (PC), commonly called the instruction pointer (IP)
in Intel x86 microprocessors. It keeps track of the the next memory address of the
instruction that is to be executed once the execution of the current instruction is
completed.
Accumulator Register:- Register is used for storing the Results those are produced by the
System.
Memory Data Register :- MDR is the register of a computer's control unit that contains
the data to be stored in the computer storage(e.g. RAM), or the data after a fetch from the
computer storage
Index Register:-A hardware element which holds a number that can be added to the
address portion of a computer instruction to form an effective address.
Data Register:-A register used in microcomputers to temporarily store data being
transmitted to or from a peripheral device.
THANK YOU
If this presentation helped you, please visit our
page facebook.com/baabtra and like it.
Thanks in advance.
www.baabtra.com | www.massbaab.com |www.baabte.com
Contact Us
Emarald Mall (Big Bazar Building)
Mavoor Road, Kozhikode,
Kerala, India.
Ph: + 91 – 495 40 25 550
NC Complex, Near Bus Stand
Mukkam, Kozhikode,
Kerala, India.
Ph: + 91 – 495 40 25 550
Start up Village
Eranakulam,
Kerala, India.
Email: info@baabtra.com

Contenu connexe

Tendances

Random access memory
Random access memoryRandom access memory
Random access memoryBESOR ACADEMY
 
Types of memory 10 to11
Types of memory 10 to11Types of memory 10 to11
Types of memory 10 to11myrajendra
 
Csc1401 lecture06 - internal memory
Csc1401   lecture06 - internal memoryCsc1401   lecture06 - internal memory
Csc1401 lecture06 - internal memoryIIUM
 
Power point presentation on memory of computer
Power point presentation on memory of computerPower point presentation on memory of computer
Power point presentation on memory of computerArpita Banerjee
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesHem Pokhrel
 
RAM (Random Access Memory)
RAM (Random Access Memory)RAM (Random Access Memory)
RAM (Random Access Memory)divyanshbatham
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSAngel Mary George
 
Difference between RAM and ROM
Difference between RAM and ROMDifference between RAM and ROM
Difference between RAM and ROMKapil Dev Das
 
Types of Computer Memories
Types of Computer MemoriesTypes of Computer Memories
Types of Computer MemoriesBilal Ahmad
 
Computer memory & Memory Storage Devices.
Computer memory & Memory Storage Devices.Computer memory & Memory Storage Devices.
Computer memory & Memory Storage Devices.RajThakuri
 
Random Access Memory(RAM)
Random Access Memory(RAM)Random Access Memory(RAM)
Random Access Memory(RAM)Adeel Yousaf
 
Memory organisation ppt final presentation
Memory organisation ppt final presentationMemory organisation ppt final presentation
Memory organisation ppt final presentationrockymani
 
Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)sumanth ch
 

Tendances (20)

Random access memory
Random access memoryRandom access memory
Random access memory
 
Types of memory 10 to11
Types of memory 10 to11Types of memory 10 to11
Types of memory 10 to11
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Csc1401 lecture06 - internal memory
Csc1401   lecture06 - internal memoryCsc1401   lecture06 - internal memory
Csc1401 lecture06 - internal memory
 
Power point presentation on memory of computer
Power point presentation on memory of computerPower point presentation on memory of computer
Power point presentation on memory of computer
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their Types
 
Internal memory
Internal memoryInternal memory
Internal memory
 
RAM (Random Access Memory)
RAM (Random Access Memory)RAM (Random Access Memory)
RAM (Random Access Memory)
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Random Access Memory ppt
 
Computer Memory
 Computer Memory Computer Memory
Computer Memory
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
Difference between RAM and ROM
Difference between RAM and ROMDifference between RAM and ROM
Difference between RAM and ROM
 
05 Internal Memory
05  Internal  Memory05  Internal  Memory
05 Internal Memory
 
Types of Computer Memories
Types of Computer MemoriesTypes of Computer Memories
Types of Computer Memories
 
Computer memory & Memory Storage Devices.
Computer memory & Memory Storage Devices.Computer memory & Memory Storage Devices.
Computer memory & Memory Storage Devices.
 
Random Access Memory(RAM)
Random Access Memory(RAM)Random Access Memory(RAM)
Random Access Memory(RAM)
 
Memory organisation ppt final presentation
Memory organisation ppt final presentationMemory organisation ppt final presentation
Memory organisation ppt final presentation
 
memory hierarchy
memory hierarchymemory hierarchy
memory hierarchy
 
12 it2003
12 it200312 it2003
12 it2003
 
Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)Memory Hierarchy (RAM and ROM)
Memory Hierarchy (RAM and ROM)
 

En vedette (6)

.Net framework
.Net framework.Net framework
.Net framework
 
Stored procedure
Stored procedureStored procedure
Stored procedure
 
Normalization
NormalizationNormalization
Normalization
 
Header creation in CPP
Header creation in CPPHeader creation in CPP
Header creation in CPP
 
Intoduction to php restful web service
Intoduction to php  restful web serviceIntoduction to php  restful web service
Intoduction to php restful web service
 
function Creation in Mysql
function Creation in Mysqlfunction Creation in Mysql
function Creation in Mysql
 

Similaire à Memory

Memory - RAM and its types
Memory - RAM and its typesMemory - RAM and its types
Memory - RAM and its typesAbhay Matthew
 
Topic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxTopic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxMartMantilla1
 
Ram and types of ram.Cache
Ram and types of ram.CacheRam and types of ram.Cache
Ram and types of ram.Cachehamza mukhtiar
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORYRajat More
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilogSrinivas Naidu
 
Chapter 5
Chapter 5Chapter 5
Chapter 5askme
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devicesChuuHye
 
It compter applications
It compter applicationsIt compter applications
It compter applicationsHamza Mughal
 
Basic computer hardware terminology
Basic computer hardware terminologyBasic computer hardware terminology
Basic computer hardware terminologyImtiyaz Husaini
 
CH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptxCH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptxPragatiKachhi1
 
What is Computer Memory.ppt
What is Computer Memory.pptWhat is Computer Memory.ppt
What is Computer Memory.pptMuhammad Naeem
 
Lincoln khan computer presentation
Lincoln khan computer presentationLincoln khan computer presentation
Lincoln khan computer presentationLincoln khan
 
Presentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsPresentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsaddokenneth58
 

Similaire à Memory (20)

Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02Memorydevices 110602031611-phpapp02
Memorydevices 110602031611-phpapp02
 
06 - Memory.ppt
06 - Memory.ppt06 - Memory.ppt
06 - Memory.ppt
 
Memory - RAM and its types
Memory - RAM and its typesMemory - RAM and its types
Memory - RAM and its types
 
Topic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptxTopic 10- Random Access Memory (RAM).pptx
Topic 10- Random Access Memory (RAM).pptx
 
Ram and types of ram.Cache
Ram and types of ram.CacheRam and types of ram.Cache
Ram and types of ram.Cache
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Memory and storage devices
Memory and storage devicesMemory and storage devices
Memory and storage devices
 
RAM And ROM
RAM And ROMRAM And ROM
RAM And ROM
 
Ram ppt
Ram pptRam ppt
Ram ppt
 
It compter applications
It compter applicationsIt compter applications
It compter applications
 
Memory managment
Memory managmentMemory managment
Memory managment
 
Basic computer hardware terminology
Basic computer hardware terminologyBasic computer hardware terminology
Basic computer hardware terminology
 
Main Memory RAM and ROM
Main Memory RAM and ROMMain Memory RAM and ROM
Main Memory RAM and ROM
 
CH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptxCH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptx
 
Comp App Lect 3.pptx
Comp App Lect 3.pptxComp App Lect 3.pptx
Comp App Lect 3.pptx
 
What is Computer Memory.ppt
What is Computer Memory.pptWhat is Computer Memory.ppt
What is Computer Memory.ppt
 
Lincoln khan computer presentation
Lincoln khan computer presentationLincoln khan computer presentation
Lincoln khan computer presentation
 
Presentation2 (1).pp text book for students
Presentation2 (1).pp text book for studentsPresentation2 (1).pp text book for students
Presentation2 (1).pp text book for students
 

Plus de baabtra.com - No. 1 supplier of quality freshers

Plus de baabtra.com - No. 1 supplier of quality freshers (20)

Agile methodology and scrum development
Agile methodology and scrum developmentAgile methodology and scrum development
Agile methodology and scrum development
 
Best coding practices
Best coding practicesBest coding practices
Best coding practices
 
Core java - baabtra
Core java - baabtraCore java - baabtra
Core java - baabtra
 
Acquiring new skills what you should know
Acquiring new skills   what you should knowAcquiring new skills   what you should know
Acquiring new skills what you should know
 
Baabtra.com programming at school
Baabtra.com programming at schoolBaabtra.com programming at school
Baabtra.com programming at school
 
99LMS for Enterprises - LMS that you will love
99LMS for Enterprises - LMS that you will love 99LMS for Enterprises - LMS that you will love
99LMS for Enterprises - LMS that you will love
 
Php sessions & cookies
Php sessions & cookiesPhp sessions & cookies
Php sessions & cookies
 
Php database connectivity
Php database connectivityPhp database connectivity
Php database connectivity
 
Chapter 6 database normalisation
Chapter 6  database normalisationChapter 6  database normalisation
Chapter 6 database normalisation
 
Chapter 5 transactions and dcl statements
Chapter 5  transactions and dcl statementsChapter 5  transactions and dcl statements
Chapter 5 transactions and dcl statements
 
Chapter 4 functions, views, indexing
Chapter 4  functions, views, indexingChapter 4  functions, views, indexing
Chapter 4 functions, views, indexing
 
Chapter 3 stored procedures
Chapter 3 stored proceduresChapter 3 stored procedures
Chapter 3 stored procedures
 
Chapter 2 grouping,scalar and aggergate functions,joins inner join,outer join
Chapter 2  grouping,scalar and aggergate functions,joins   inner join,outer joinChapter 2  grouping,scalar and aggergate functions,joins   inner join,outer join
Chapter 2 grouping,scalar and aggergate functions,joins inner join,outer join
 
Chapter 1 introduction to sql server
Chapter 1 introduction to sql serverChapter 1 introduction to sql server
Chapter 1 introduction to sql server
 
Chapter 1 introduction to sql server
Chapter 1 introduction to sql serverChapter 1 introduction to sql server
Chapter 1 introduction to sql server
 
Microsoft holo lens
Microsoft holo lensMicrosoft holo lens
Microsoft holo lens
 
Blue brain
Blue brainBlue brain
Blue brain
 
5g
5g5g
5g
 
Aptitude skills baabtra
Aptitude skills baabtraAptitude skills baabtra
Aptitude skills baabtra
 
Gd baabtra
Gd baabtraGd baabtra
Gd baabtra
 

Dernier

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Memory

  • 1.
  • 2. Title of the presentation Anjali G anjalig2009@gmail.com dwww.facebook.com/Anjali Geetha twitter.com/Anjali Geetha in.linkedin.com/in/Anjali G 9497879952
  • 3. DIFFERENT TYPES OF MEMORIES IN A COMPUTER INCLUDING REGISTERS
  • 4. INTRODUCTION  Computer memory is any physical device capable of storing information temporarily or permanently. two types: volatile and non volatile
  • 6. VOLATILE MEMORY Volatile memory is a temporary memory that loses its contents when the computer or hardware device loses power. Computer RAM is a good example of a volatile memory  Most modern volatile memory is either Static RAM or dynamic RAM. SRAM:-  SRAM uses six transistors per bit. SRAM is faster and more reliable than the more common DRAM . While DRAM supports access times of about 60 nanoseconds, SRAM can give access times as low as 10 nanoseconds. Unfortunately SRAM is much more expensive to produce than DRAM. Due to its high cost, SRAM is often used only as a memory cache. SRAM is generally used for high-speed registers & caches.
  • 7. A typical SRAM cell is made up of six MOSFET. Each bit in an SRAM is stored on four transistors(M1, M2, M3, M4) that form two cross-coupled inverters. Main Needs: • to provide a direct interface with the CPU at speeds not attainable by DRAMs • to replace DRAMs in systems that require very low power consumption. DRAM:- DRAM is a type of random-access memory that stores each bit of data in a separate capacitor within an IC. The capacitor can be either charged or discharged; these two states are taken to represent the two values of a bit. Dynamic RAM needs regular refresh cycles to prevent its contents being lost. The advantage of DRAM is its structural simplicity: only one transistor and a capacitor are required per bit, compared to four or six transistors in SRAM.
  • 8. DRAM is usually arranged in a rectangular array of charge storage cells consisting of one capacitor and transistor per data bit.
  • 9. VIRTUAL MEMORY When computer lacks RAM; needed to run a program or operation Virtual memory is used. Virtual memory combines your computer’s RAM with temporary space on your hard disk. The purpose of virtual memory is to enlarge the address space, the set of addresses a program can utilize. The operating system divides virtual memory into pages, each of which contains a fixed number of addresses. Each page is stored on a disk until it is needed. When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM to complete its work. OS is translating virtual addresses into real addresses. The process of translating virtual addresses into real addresses is called mapping. The copying of virtual pages from disk to main memory is known as paging.
  • 10. NONVOLATILE MEMORY Non-volatile memory is computer memory that can retain the stored information even when not powered.  Examples of non-volatile memory include read-only memory , flash memory, most types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape) Read-only memory (ROM) is a class of storage medium used in computers and other electronic devices. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty, so it is mainly used to distribute firmware. Flash memory is an electronic non-volatile computer storage device that can be electrically erased and reprogrammed. Flash memory was developed from EEPROM. There are two main types of flash memory, which are named after the NAND and NOR logic gates.
  • 11. REGISTERS A special, high-speed storage area within the CPU.  All data must be represented in a register before it can be processed. The number of registers that a CPU has and the size of each help determine the power and speed of a CPU. Only assembly language programs can manipulate registers. Register performs: 1. Fetch: The Fetch Operation is used for taking the instructions those are given by the user and the Instructions those are stored into the Main Memory will be fetch by using Registers. 2. Decode: The Decode Operation is used for interpreting the Instructions means the Instructions are decoded means the CPU will find out which Operation is to be performed on the Instructions. 3. Execute: The Execute Operation is performed by the CPU. And Results those are produced by the CPU are then Stored into the Memory and after that they are displayed on the user Screen.
  • 12. TYPES OF REGISTERS Memory Address Register: -This register holds the memory addresses of data and instructions. This register is used to access data and instructions from memory during the execution phase of an instruction. Program Counter:- The program counter (PC), commonly called the instruction pointer (IP) in Intel x86 microprocessors. It keeps track of the the next memory address of the instruction that is to be executed once the execution of the current instruction is completed. Accumulator Register:- Register is used for storing the Results those are produced by the System. Memory Data Register :- MDR is the register of a computer's control unit that contains the data to be stored in the computer storage(e.g. RAM), or the data after a fetch from the computer storage Index Register:-A hardware element which holds a number that can be added to the address portion of a computer instruction to form an effective address. Data Register:-A register used in microcomputers to temporarily store data being transmitted to or from a peripheral device.
  • 14. If this presentation helped you, please visit our page facebook.com/baabtra and like it. Thanks in advance. www.baabtra.com | www.massbaab.com |www.baabte.com
  • 15. Contact Us Emarald Mall (Big Bazar Building) Mavoor Road, Kozhikode, Kerala, India. Ph: + 91 – 495 40 25 550 NC Complex, Near Bus Stand Mukkam, Kozhikode, Kerala, India. Ph: + 91 – 495 40 25 550 Start up Village Eranakulam, Kerala, India. Email: info@baabtra.com