Skip to main content

COMPUTER MEMORY

Computer memory is used to describe an electronic circuit that is responsible for storing data and applications temporarily or permanently. Computer memory can be classified into two types: primary memory and secondary memory. Primary memory is used for direct access of data by the processor. Main memory can be divided into 2 types namely RAM (Random Access Memory) and ROM (Read Only Memory). RAM retains its contents as long as electricity is on. Computer RAM is responsible for storing temporary data, so that it can be directly accessed by the processor part and if needed. Which means that the data will be deleted after the inventory on the storage device is turned off.
Types of RAM: SRAM (Static RAM) and DRAM (Dynamic RAM). Static RAM (Expensive and Fast) SRAM is a bistable circuit that attaches to storing one bit each. High prices prevent not many from using this machine for everyday use, but many modern machines use SRAM as a processor cache. Dynamic RAM: Widely used in modern computers as main memory, DRAM is slower than SRAM, but not expensive because it's easy to install memory storage.
RAM Computer (source: buzzle.com)


ROM (Read Only Memory). ROM are devices that are in the CPU. ROM is a form of permanent storage. ROM remains active regardless of whether the power supply is turned on or off. However, ROM is used (in cases that are rarely used) as the main device for most computers in the '80s. This is because the ROM device does not allow the data stored on it to be modified. As indicated by its name, the data can only be accessed and read by the user, not overwritten, upgraded or modified. System programs stored on ROM devices cannot be changed and are therefore safe to use. The types of ROMs include the PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory) and EEPROM (Electrically Erasable Programmable Read-Only Memory).
ROM Computer (source: techfuels.com)


The secondary memory cannot be directly accessed by the CPU, to access the data contained therein, then the data in the secondary memory is moved to the primary memory, then read and executed by the processor. Secondary Memory is a place where data is dwelling. Examples of secondary memory are Hardisk, pendrive, CDR and DVD are examples of secondary memory. Secondary memory speeds are slower than primary memory, as they are not oriented towards completion of task process.

REFERENSI
Differences, Tech. 2017. Difference Between Primary and Secondary Memory. Retrieved from
Hemmendinger, David. 2016. Computer Memory. Retrieved from https://www.britannica.com/technology/computer-memory

Nama : Maliana Tasha Rachman
NIM : 106218015

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...

Categories and Types of Artificial Intelligence

AI has 2 categories namely weak or strong. Weak AI also known as narrow AI. Weak AI is an AI system designed and trained for certain tasks. Weak AI can be a virtual personal assistant, like Apple Siri, Amazon’s Alexa, and Google Home. While strong AI, also known as general artificial intelligence, is an AI system with general human cognitive abilities. When a special task is presented, a strong AI system can find its own solution without human intervention. S trong AI acts more like a brain. It does not classify, but uses clustering and association to process data. In short, it means there isn’t a set answer to your keywords.  Beside that, an assistant professor of integrative biology and computer science engineering at Michigan State University, Arend Hintze, categorizes AI into 4 types, ranging from existing AI systems to AI systems that are still in design. The categories are as follows: Reactive machine. An example is Deep Blue, the IBM chess program that defeated Garr...