Skip to main content

COMPUTER MEMORY

Computer memory is used to describe an electronic circuit that is responsible for storing data and applications temporarily or permanently. Computer memory can be classified into two types: primary memory and secondary memory. Primary memory is used for direct access of data by the processor. Main memory can be divided into 2 types namely RAM (Random Access Memory) and ROM (Read Only Memory). RAM retains its contents as long as electricity is on. Computer RAM is responsible for storing temporary data, so that it can be directly accessed by the processor part and if needed. Which means that the data will be deleted after the inventory on the storage device is turned off.
Types of RAM: SRAM (Static RAM) and DRAM (Dynamic RAM). Static RAM (Expensive and Fast) SRAM is a bistable circuit that attaches to storing one bit each. High prices prevent not many from using this machine for everyday use, but many modern machines use SRAM as a processor cache. Dynamic RAM: Widely used in modern computers as main memory, DRAM is slower than SRAM, but not expensive because it's easy to install memory storage.
RAM Computer (source: buzzle.com)


ROM (Read Only Memory). ROM are devices that are in the CPU. ROM is a form of permanent storage. ROM remains active regardless of whether the power supply is turned on or off. However, ROM is used (in cases that are rarely used) as the main device for most computers in the '80s. This is because the ROM device does not allow the data stored on it to be modified. As indicated by its name, the data can only be accessed and read by the user, not overwritten, upgraded or modified. System programs stored on ROM devices cannot be changed and are therefore safe to use. The types of ROMs include the PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory) and EEPROM (Electrically Erasable Programmable Read-Only Memory).
ROM Computer (source: techfuels.com)


The secondary memory cannot be directly accessed by the CPU, to access the data contained therein, then the data in the secondary memory is moved to the primary memory, then read and executed by the processor. Secondary Memory is a place where data is dwelling. Examples of secondary memory are Hardisk, pendrive, CDR and DVD are examples of secondary memory. Secondary memory speeds are slower than primary memory, as they are not oriented towards completion of task process.

REFERENSI
Differences, Tech. 2017. Difference Between Primary and Secondary Memory. Retrieved from
Hemmendinger, David. 2016. Computer Memory. Retrieved from https://www.britannica.com/technology/computer-memory

Nama : Maliana Tasha Rachman
NIM : 106218015

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...