SlideShare a Scribd company logo
1 of 16
Download to read offline
UKWIMI TRADES TRAINING
INSTITUTE
COMPUTER APPLICATION
TERM 2 – SESSION 9
TOPIC COVERED TODAY:
• MEMORY OF THE COMPUTER
• Units of memory
• The different units of measurement
• Conversion
• Types of Memory
• Primary Memory
• RAM
• ROM
• Secondary memory
MEMORY OF THE COMPUTER
• Memory or storage capacity is one of the important components of a
computer.
• Any storage unit of a computer system is classified on the basis of the
following criteria:
• 1. Access time: This is the time required to locate and retrieve stored
data from the storage unit in response to program instructions.
• 2. Storage capacity: It is the amount of data that can be stored in the
storage unit.
• 3. Cost per bit of storage.
Units of memory
• The computer stores a character in the storage cells with binary (0,1)
mechanism.
• Thus the basic unit of memory is a bit (binary digit – 0,1).
• To store a character, a computer requires 8 bits or 1 byte.
• This is called the ― word length of the storage unit.
• Hence the storage capacity of the computer is measured in the
number of words it can store and is expressed in terms of bytes.
The different units of measurement are:
Conversion
• ASCII – American Standard Code for Information Interchange.
• This code has given alphabets like some numbers which can be
converted to Binary form.
• The following is a link to access the full ASCII table
ASCII table - Table of ASCII codes, characters and symbols (ascii-
code.com)
Types of Memory
A computer memory is of two types
• 1. Primary Memory ( Internal storage)
• 2. Secondary Memory ( External storage)
Primary Memory
• Primary memory is also called internal memory and is an important
part of a computer.
• It is the main area in a computer where the data is stored.
• The stored data can be recalled instantly and correctly whenever
desired.
• This memory can be quickly accessed by the CPU for reading
or storing information.
• Primary memory is further classified into two types:
• Random Access Memory (RAM)
• and Read- Only Memory (ROM )
RAM:
• RAM is also known as read/write memory as information can be read
from and written onto it.
• RAM is a place in a computer that holds instructions for the computer,
its programs and the data.
• The CPU can directly access the data from RAM almost immediately.
• However, the storage of data and instructions in RAM is temporary, till
the time the computer is running.
• It disappears from RAM as soon as the power to the computer is
switched off. i.e it is volatile memory.
ROM
• It is called Read-only memory as information can only be read from
and not written or changed onto ROM.
• ROM is the ‘built-in‘ memory of a computer. It stores some basic
input – output instructions put by the manufacturer to operate the
computer.
• The storage of data and instructions in ROM is permanent.
• It does not depend on the power supply. i.e it is non-volatile memory.
Secondary memory
• The primary memory which is faster (and hence expensive) is generally not
sufficient for large storage of data.
• As a result, additional memory, called the ‘axiliary’ or ‘secondary memory’
is used.
• It is also referred as ‘backup storage’ as it is used to store large volume of
data on a permanent basis which can be transferred to the primary
memory whenever required for processing.
• Data are stored in secondary storage in the same binary codes as in the
main (primary memory) storage.
• Some of the devices of secondary storages are Floppy Disk, Hard Disk, CD-
ROM, DVD and Flash drive.

More Related Content

Similar to SESSION 9 - Storage on the computer .pdf

5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptxKunalGola6
 
TYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESTYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESShahbaz Baloch
 
Exploring Of System Hardware
Exploring Of System HardwareExploring Of System Hardware
Exploring Of System HardwareMuhammad Nauman
 
Computer Memory
Computer MemoryComputer Memory
Computer MemoryFaraz Ahmed
 
computer architecture and organisation
computer architecture and organisationcomputer architecture and organisation
computer architecture and organisationRamjiChaurasiya
 
Presentacion pujol
Presentacion pujolPresentacion pujol
Presentacion pujolDylan Real G
 
Memory & its types presentation1
Memory & its types presentation1Memory & its types presentation1
Memory & its types presentation1JAI BAMORIYA
 
Introduction to Types of Memory Chips
Introduction to Types of Memory ChipsIntroduction to Types of Memory Chips
Introduction to Types of Memory ChipsMahe Karim
 
coa memories
coa memoriescoa memories
coa memoriesSupriyaEde
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitRai University
 
Intro computers
Intro computersIntro computers
Intro computersmikhilmurali
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unitRai University
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptxkndnewguade
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitRai University
 
Memory Organisation.pptx
Memory Organisation.pptxMemory Organisation.pptx
Memory Organisation.pptxBtechlife
 

Similar to SESSION 9 - Storage on the computer .pdf (20)

5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptx
 
Ram & rom
Ram & romRam & rom
Ram & rom
 
TYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIESTYPES OF COMPUTER MEMORIES
TYPES OF COMPUTER MEMORIES
 
Exploring Of System Hardware
Exploring Of System HardwareExploring Of System Hardware
Exploring Of System Hardware
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
computer architecture and organisation
computer architecture and organisationcomputer architecture and organisation
computer architecture and organisation
 
Presentacion pujol
Presentacion pujolPresentacion pujol
Presentacion pujol
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Memory & its types presentation1
Memory & its types presentation1Memory & its types presentation1
Memory & its types presentation1
 
Introduction to Types of Memory Chips
Introduction to Types of Memory ChipsIntroduction to Types of Memory Chips
Introduction to Types of Memory Chips
 
Primary Memories.pptx
Primary Memories.pptxPrimary Memories.pptx
Primary Memories.pptx
 
coa memories
coa memoriescoa memories
coa memories
 
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unitBca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
Bca 2nd sem-u-1.7 digital logic circuits, digital component memory unit
 
Intro computers
Intro computersIntro computers
Intro computers
 
digital logic circuits, digital component memory unit
 digital logic circuits, digital component memory unit digital logic circuits, digital component memory unit
digital logic circuits, digital component memory unit
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptx
 
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unitB.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
B.sc cs-ii-u-1.7 digital logic circuits, digital component memory unit
 
Internal storage devices
Internal storage devicesInternal storage devices
Internal storage devices
 
Memory Unit
Memory UnitMemory Unit
Memory Unit
 
Memory Organisation.pptx
Memory Organisation.pptxMemory Organisation.pptx
Memory Organisation.pptx
 

More from Maxwell Musonda

SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...Maxwell Musonda
 
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdfSESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdfMaxwell Musonda
 
SESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdfSESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdfMaxwell Musonda
 
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdfSESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdfMaxwell Musonda
 
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdfSESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdfMaxwell Musonda
 
SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...Maxwell Musonda
 
Lecture 10 using powerpoint and project presentations
Lecture 10   using powerpoint and project presentationsLecture 10   using powerpoint and project presentations
Lecture 10 using powerpoint and project presentationsMaxwell Musonda
 
Lec ture 9 using the internet
Lec ture 9   using the internetLec ture 9   using the internet
Lec ture 9 using the internetMaxwell Musonda
 
Lecture 8 using spreadsheet
Lecture 8   using spreadsheetLecture 8   using spreadsheet
Lecture 8 using spreadsheetMaxwell Musonda
 
Lecture 5 sending and receiving e-mail
Lecture 5   sending and receiving e-mailLecture 5   sending and receiving e-mail
Lecture 5 sending and receiving e-mailMaxwell Musonda
 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mailMaxwell Musonda
 
Lecture 3 use word processing for technical report
Lecture 3   use word processing for technical report Lecture 3   use word processing for technical report
Lecture 3 use word processing for technical report Maxwell Musonda
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating systemMaxwell Musonda
 
Lecture 1 operate a computer system
Lecture 1   operate a computer systemLecture 1   operate a computer system
Lecture 1 operate a computer systemMaxwell Musonda
 

More from Maxwell Musonda (14)

SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
SESSION 6 - Input Devices - Optical Scanners and Magnetic Ink Character Recog...
 
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdfSESSION 5 - Basic input devices, Keyboard and Mouse .pdf
SESSION 5 - Basic input devices, Keyboard and Mouse .pdf
 
SESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdfSESSION 4 - Generations of Computers .pdf
SESSION 4 - Generations of Computers .pdf
 
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdfSESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
SESSION 3 - IMPORTANCE OF COMPUTERS IN BUSINESS.pdf
 
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdfSESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
SESSION 2 - CHARACTERISTICS OF COMPUTERS.pdf
 
SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...SESSION 1 - Introductory lesson to computer applications - definition of comp...
SESSION 1 - Introductory lesson to computer applications - definition of comp...
 
Lecture 10 using powerpoint and project presentations
Lecture 10   using powerpoint and project presentationsLecture 10   using powerpoint and project presentations
Lecture 10 using powerpoint and project presentations
 
Lec ture 9 using the internet
Lec ture 9   using the internetLec ture 9   using the internet
Lec ture 9 using the internet
 
Lecture 8 using spreadsheet
Lecture 8   using spreadsheetLecture 8   using spreadsheet
Lecture 8 using spreadsheet
 
Lecture 5 sending and receiving e-mail
Lecture 5   sending and receiving e-mailLecture 5   sending and receiving e-mail
Lecture 5 sending and receiving e-mail
 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mail
 
Lecture 3 use word processing for technical report
Lecture 3   use word processing for technical report Lecture 3   use word processing for technical report
Lecture 3 use word processing for technical report
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
 
Lecture 1 operate a computer system
Lecture 1   operate a computer systemLecture 1   operate a computer system
Lecture 1 operate a computer system
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

SESSION 9 - Storage on the computer .pdf

  • 1. UKWIMI TRADES TRAINING INSTITUTE COMPUTER APPLICATION TERM 2 – SESSION 9
  • 2. TOPIC COVERED TODAY: • MEMORY OF THE COMPUTER • Units of memory • The different units of measurement • Conversion • Types of Memory • Primary Memory • RAM • ROM • Secondary memory
  • 3. MEMORY OF THE COMPUTER • Memory or storage capacity is one of the important components of a computer. • Any storage unit of a computer system is classified on the basis of the following criteria: • 1. Access time: This is the time required to locate and retrieve stored data from the storage unit in response to program instructions. • 2. Storage capacity: It is the amount of data that can be stored in the storage unit. • 3. Cost per bit of storage.
  • 4. Units of memory • The computer stores a character in the storage cells with binary (0,1) mechanism. • Thus the basic unit of memory is a bit (binary digit – 0,1). • To store a character, a computer requires 8 bits or 1 byte. • This is called the ― word length of the storage unit. • Hence the storage capacity of the computer is measured in the number of words it can store and is expressed in terms of bytes.
  • 5. The different units of measurement are:
  • 6. Conversion • ASCII – American Standard Code for Information Interchange. • This code has given alphabets like some numbers which can be converted to Binary form. • The following is a link to access the full ASCII table ASCII table - Table of ASCII codes, characters and symbols (ascii- code.com)
  • 7.
  • 8.
  • 9. Types of Memory A computer memory is of two types • 1. Primary Memory ( Internal storage) • 2. Secondary Memory ( External storage)
  • 10. Primary Memory • Primary memory is also called internal memory and is an important part of a computer. • It is the main area in a computer where the data is stored. • The stored data can be recalled instantly and correctly whenever desired. • This memory can be quickly accessed by the CPU for reading or storing information.
  • 11. • Primary memory is further classified into two types: • Random Access Memory (RAM) • and Read- Only Memory (ROM )
  • 12. RAM: • RAM is also known as read/write memory as information can be read from and written onto it. • RAM is a place in a computer that holds instructions for the computer, its programs and the data. • The CPU can directly access the data from RAM almost immediately. • However, the storage of data and instructions in RAM is temporary, till the time the computer is running. • It disappears from RAM as soon as the power to the computer is switched off. i.e it is volatile memory.
  • 13.
  • 14.
  • 15. ROM • It is called Read-only memory as information can only be read from and not written or changed onto ROM. • ROM is the ‘built-in‘ memory of a computer. It stores some basic input – output instructions put by the manufacturer to operate the computer. • The storage of data and instructions in ROM is permanent. • It does not depend on the power supply. i.e it is non-volatile memory.
  • 16. Secondary memory • The primary memory which is faster (and hence expensive) is generally not sufficient for large storage of data. • As a result, additional memory, called the ‘axiliary’ or ‘secondary memory’ is used. • It is also referred as ‘backup storage’ as it is used to store large volume of data on a permanent basis which can be transferred to the primary memory whenever required for processing. • Data are stored in secondary storage in the same binary codes as in the main (primary memory) storage. • Some of the devices of secondary storages are Floppy Disk, Hard Disk, CD- ROM, DVD and Flash drive.