SlideShare une entreprise Scribd logo
1  sur  19
Storing Data
Abdul Wajid

1
Storage of Data
Instructions and data are held in main memory
which is divided into millions of addressable
storage units called bytes.
One byte can hold one character
One byte can hold 8 bits
Computers work by using pulses of voltage
which represent either 1 or 0
A low voltage mean 0 and high voltage mean 1
Total bytes in main memory referred to as the
computer’s memory size.

2
Bits
Computers use electronic circuits to
perform the tasks they are
programmed to complete.
These circuits can be in one of two
states - ‘On’ or ‘Off’.

3
Memory Sizes measurement
I nibble
= 4 bits
I byte
= 8 bits
I kilobytes (kb)
= 1024 bytes
1 Megabytes (Mb) = 1024kilobytes
1 gigabytes (Gb) = 1024Megabytes
1 terabytes (TB) = 1024Gigabytes

4
Memory ( Main store)
 Memory is the name given to the group of chips inside
the processing unit
 The data held in the memory is available to the computer
Memory is used to hold following information
 Programs
 Input data
 Working Area
 Output data
 There are two types of main memory
 Ram (Random access memory )
 ROM (Read only memory )
5
RAM & ROM
Ram

ROM
Its temporary memory Its Permanent memory
Read and Write data It can only be read
Data can be changed Data can not change or
deleted
or deleted
It is a Volatile memory It is non Volatile
The instructions are
The instructions
written into Rom at
written in Ram at the
manufacturing time.
time of execution
(BIOS)

6
Semiconductor

Volatile

Memory
types
Non-volatile

RAM

SRAM

ROM

DRAM

PROM

EPROM

7
PROM & EPROM
PROM
 Programmable read only
memory
 User can write instruction
only one time
 Instructions can not be
erased
 If there is error while
writing on PROM ,it
becomes unusable

EPROM
 Erasable programmable
Rom
 User can write instruction
many times
 Instructions can be
erased
 If there is error while
writing on EPROM, it can
still be used again
8
SRAM & DRAM
SRAM
Static Random Access
Memory
It can store its value
without any need to
refresh the data as
long as the power is
available
It utilizes less power
It is more expansive

DRAM
Dynamic Random
Access Memory
It has to be refreshed
after each read
operation.
It utilizes more power
It is less expansive

9
Floppy Disk
Used to transfer small amount of data between
computers
Come with 3.5 inch disk drive
Floppy disk is the hard case the disk inside in
floppy
Magnetic disk store binary data as a magnetic
pattern on the disk surface
It hold 1.44MB of data
Before the data is stored on a disk the disk
needs to be formatted
10
Hard drives
 Consist a several disks on a single
spindle
 Each disk surface able to store data
 Each surface can have its own
read/write head
 This enables the read/write heads to
operate simultaneously which means
that the data can be transferred more
quickly than by using the large disk
 Hard disk is available in all sorts of
sizes
 A typical computer will have a hard disk
capacity of around 20 GB

11
Hard Disk Mechanism

12
Magnetic Tape
Large spools of tape are used very large
computer systems that need to hold huge
amount of data
They are not as common as they used to
be
They look similar to audio cassettes
except they are larger
Their main use is for making backup
copies of hard disk

13
CD-ROM Drives
Use the same technology as music CD and CD
players
The data is stored on the disk digitally and a
laser beam is used to read the disk
Light is used to read the disk the data may be
packed closely and disk therefore has a huge
capacity
Are included in multimedia system
CD-ROMs can be filled with clip art
,encyclopedia ,photograph and all sort of data
Are read only disk
A CD holds around 600MB data
14
CD-R
A CD recordable (CD-R) drive has a
read/write capability.
Using this device you can write around 15
minutes
CD-R can be used to back up hard drives.
Standard CD-R disks can be written to
only once but there is a type of disks can
be written, erased and rewritten
They are more expensive than CD-R
disks

15
Digital Versatile Disks (DVD)
 Are similar to CD-ROMs in that they look identical and
are used to store lots of date.
 Like CD-ROM they can be used to store computer
application software, multimedia programs and full length
movies
 This is because CD-Rom typically store 650 MB of data
whereas to a DVD stores between 4.7 GB
 DVDs also are used to store movies where they produce
much better quality pictures and sound compared to a
normal video tape.
 A film stored on DVD can even be made to offer the
viewer a choice of several languages in which it can be
played back
16
Backup devices
It is important to take regular backups of both
data and programs for security purposes.
Floppy disks do not have a very high storage
capacity and so are seldom used for backup.
Instead higher capacity and faster storage
devices are used and main ones are as follows
Tape streamers
Zip drives
Jaz drives
17
Tape streamers
Are devices used to backup the data contained
on hard drives

Zip Drives
Are useful for backing up hard drives
They are high storage capacity floppy disks
which are slightly larger and twice as thick as
normal floppies
They can typical store data 100 MB or 250 MB
18
Jaz Drives
Is a removable disk drive which is very
fast at transferring data.
Each disk hold up to 2 GB of data
The higher data transfer rate means that
they can be used to backup data in a very
short time
They can be used for everyday storage
just like an ordinary disk drive
19

Contenu connexe

Tendances (20)

Storage Devices PPt For class 9
Storage Devices PPt For class 9Storage Devices PPt For class 9
Storage Devices PPt For class 9
 
memory and storage devices
memory and storage devicesmemory and storage devices
memory and storage devices
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
 
storage devices
storage devicesstorage devices
storage devices
 
Secondary storage devices
Secondary storage devices Secondary storage devices
Secondary storage devices
 
Storage Device
Storage DeviceStorage Device
Storage Device
 
storage devices
storage devicesstorage devices
storage devices
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Storage Devices Presentation
Storage Devices PresentationStorage Devices Presentation
Storage Devices Presentation
 
Secondary Memory
Secondary MemorySecondary Memory
Secondary Memory
 
Primary and secondary Storage devices
Primary and secondary Storage devicesPrimary and secondary Storage devices
Primary and secondary Storage devices
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
 
STORAGE DEVICES
STORAGE DEVICESSTORAGE DEVICES
STORAGE DEVICES
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
secondary storage devices
secondary storage devicessecondary storage devices
secondary storage devices
 
storage devices and its types
 storage devices and its types storage devices and its types
storage devices and its types
 

Similaire à Storing data ch 4

Storage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxStorage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxMalikAtiq4
 
Computer memory
Computer memoryComputer memory
Computer memoryMrjonesit
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Afaq Siddiqui
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devisesdevaki123
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentalsRaj vardhan
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentationRitu Jhalani
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devicesPichano Kikon
 
Computer Hardwares for Class 1
Computer Hardwares for Class 1Computer Hardwares for Class 1
Computer Hardwares for Class 1Faisal Gulzar
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptxjulitolosbanos
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentationaaravSingh41
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxSriShailam5
 
Data storage
Data storageData storage
Data storagetonysusu
 
Chapter1 9-07
Chapter1 9-07Chapter1 9-07
Chapter1 9-07dereennn
 

Similaire à Storing data ch 4 (20)

Storage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxStorage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptx
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devises
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
 
Storage Devices .docx
Storage Devices                    .docxStorage Devices                    .docx
Storage Devices .docx
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
 
Memory 02
Memory 02Memory 02
Memory 02
 
Cmp
CmpCmp
Cmp
 
Computer Hardwares for Class 1
Computer Hardwares for Class 1Computer Hardwares for Class 1
Computer Hardwares for Class 1
 
Memory
MemoryMemory
Memory
 
computer storage
computer storagecomputer storage
computer storage
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
COMPUTER MEMORY
COMPUTER MEMORYCOMPUTER MEMORY
COMPUTER MEMORY
 
CSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptxCSE-Computer-Memory-PPT.pptx
CSE-Computer-Memory-PPT.pptx
 
Data storage
Data storageData storage
Data storage
 
Chapter1 9-07
Chapter1 9-07Chapter1 9-07
Chapter1 9-07
 

Plus de Khan Yousafzai

09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operationKhan Yousafzai
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and designKhan Yousafzai
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solvingKhan Yousafzai
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic officeKhan Yousafzai
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your healthKhan Yousafzai
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of itKhan Yousafzai
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections actKhan Yousafzai
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Khan Yousafzai
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information systemKhan Yousafzai
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting dataKhan Yousafzai
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operationsKhan Yousafzai
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your dataKhan Yousafzai
 

Plus de Khan Yousafzai (20)

14 data logging
14   data logging14   data logging
14 data logging
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
 
23 simulations
23   simulations23   simulations
23 simulations
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Storing data ch 4

  • 2. Storage of Data Instructions and data are held in main memory which is divided into millions of addressable storage units called bytes. One byte can hold one character One byte can hold 8 bits Computers work by using pulses of voltage which represent either 1 or 0 A low voltage mean 0 and high voltage mean 1 Total bytes in main memory referred to as the computer’s memory size. 2
  • 3. Bits Computers use electronic circuits to perform the tasks they are programmed to complete. These circuits can be in one of two states - ‘On’ or ‘Off’. 3
  • 4. Memory Sizes measurement I nibble = 4 bits I byte = 8 bits I kilobytes (kb) = 1024 bytes 1 Megabytes (Mb) = 1024kilobytes 1 gigabytes (Gb) = 1024Megabytes 1 terabytes (TB) = 1024Gigabytes 4
  • 5. Memory ( Main store)  Memory is the name given to the group of chips inside the processing unit  The data held in the memory is available to the computer Memory is used to hold following information  Programs  Input data  Working Area  Output data  There are two types of main memory  Ram (Random access memory )  ROM (Read only memory ) 5
  • 6. RAM & ROM Ram ROM Its temporary memory Its Permanent memory Read and Write data It can only be read Data can be changed Data can not change or deleted or deleted It is a Volatile memory It is non Volatile The instructions are The instructions written into Rom at written in Ram at the manufacturing time. time of execution (BIOS) 6
  • 8. PROM & EPROM PROM  Programmable read only memory  User can write instruction only one time  Instructions can not be erased  If there is error while writing on PROM ,it becomes unusable EPROM  Erasable programmable Rom  User can write instruction many times  Instructions can be erased  If there is error while writing on EPROM, it can still be used again 8
  • 9. SRAM & DRAM SRAM Static Random Access Memory It can store its value without any need to refresh the data as long as the power is available It utilizes less power It is more expansive DRAM Dynamic Random Access Memory It has to be refreshed after each read operation. It utilizes more power It is less expansive 9
  • 10. Floppy Disk Used to transfer small amount of data between computers Come with 3.5 inch disk drive Floppy disk is the hard case the disk inside in floppy Magnetic disk store binary data as a magnetic pattern on the disk surface It hold 1.44MB of data Before the data is stored on a disk the disk needs to be formatted 10
  • 11. Hard drives  Consist a several disks on a single spindle  Each disk surface able to store data  Each surface can have its own read/write head  This enables the read/write heads to operate simultaneously which means that the data can be transferred more quickly than by using the large disk  Hard disk is available in all sorts of sizes  A typical computer will have a hard disk capacity of around 20 GB 11
  • 13. Magnetic Tape Large spools of tape are used very large computer systems that need to hold huge amount of data They are not as common as they used to be They look similar to audio cassettes except they are larger Their main use is for making backup copies of hard disk 13
  • 14. CD-ROM Drives Use the same technology as music CD and CD players The data is stored on the disk digitally and a laser beam is used to read the disk Light is used to read the disk the data may be packed closely and disk therefore has a huge capacity Are included in multimedia system CD-ROMs can be filled with clip art ,encyclopedia ,photograph and all sort of data Are read only disk A CD holds around 600MB data 14
  • 15. CD-R A CD recordable (CD-R) drive has a read/write capability. Using this device you can write around 15 minutes CD-R can be used to back up hard drives. Standard CD-R disks can be written to only once but there is a type of disks can be written, erased and rewritten They are more expensive than CD-R disks 15
  • 16. Digital Versatile Disks (DVD)  Are similar to CD-ROMs in that they look identical and are used to store lots of date.  Like CD-ROM they can be used to store computer application software, multimedia programs and full length movies  This is because CD-Rom typically store 650 MB of data whereas to a DVD stores between 4.7 GB  DVDs also are used to store movies where they produce much better quality pictures and sound compared to a normal video tape.  A film stored on DVD can even be made to offer the viewer a choice of several languages in which it can be played back 16
  • 17. Backup devices It is important to take regular backups of both data and programs for security purposes. Floppy disks do not have a very high storage capacity and so are seldom used for backup. Instead higher capacity and faster storage devices are used and main ones are as follows Tape streamers Zip drives Jaz drives 17
  • 18. Tape streamers Are devices used to backup the data contained on hard drives Zip Drives Are useful for backing up hard drives They are high storage capacity floppy disks which are slightly larger and twice as thick as normal floppies They can typical store data 100 MB or 250 MB 18
  • 19. Jaz Drives Is a removable disk drive which is very fast at transferring data. Each disk hold up to 2 GB of data The higher data transfer rate means that they can be used to backup data in a very short time They can be used for everyday storage just like an ordinary disk drive 19