SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Presented by: 
Dashembha Dohtdong 
Roll NO: 0810,Mba
1. Computer memory 
2. Storage Evaluation Criteria 
3. Primary memory 
4. Secondary memory 
5. Types of Primary memory 
6. Types of Secondary memory 
7. Contents 
8. Sources
Data and instructions entered into a computer systems 
through input units have to be stored inside the computer 
before actual processing starts. Similarly results 
produced by a computer after processing have to be kept 
somewhere inside the computer system before being 
passed on to an output unit. Moreover a computer must 
also preserve intermediate results for ongoing 
processing. 
Storage unit holdS : 
 Data and instructions required for processing 
 Intermediate results of processing 
 Results for output
 Storage Capacity: Amount of data that can be stored. 
 Access Time: Time required to locate and retrieved 
stored data from the storage unit in response to a 
program instruction 
 Cost Per Bit of Storage: Cost of a storage unit for a given 
storage capacity. 
 Volatile: Lost of stored data when power is turn off or 
interrupted. 
 Random Access: If the time taken to access a piece of 
data from a storage unit is independent of the location of 
the data in the storage unit it is called random access 
storage or random access memory(RAM), pseudo-random 
access (access time is nearly same for all 
location but not exactly same) or sequential access 
(access time depends on the location of the data) 
property.
1.Primary/main memory: 
 Used to hold pieces of program instructions and data, 
intermediate results of processing, recently produced 
results of those job(s) on which the computer is currently 
working. 
 These pieces of information are represented electronically 
in the main memory chip circuitry and while it remains in 
the main memory, central processing unit can access it 
directly at a very high speed. 
 Its volatile in nature. 
 limited storage capacity 
 It have random access property.
 Holds the program instructions, data and information of 
those jobs on which the computer system is currently not 
working but needs to hold them for processing later 
 Store large volume of data on permanent basis 
 It is much cheaper than primary memory. 
 Non-volatile in nature 
 Have either pseudo-random access (access time is 
nearly same for all location but not exactly same) or 
sequential access (access time depends on the location 
of the data) property
I. RAM: Randomly select and used any location of this 
memory to directly store and retrieve data and 
instructions. 
II. ROM:A non-volatile memory chip in which data is stored 
permanently and cannot be altered by usual programs. 
III. PROM:A user-programmed ROM is one in which a user 
can load and store ‘read- only’ programs and data i.e. it 
is possible for a user to customize’ a system by 
converting his/her programs to micro-programs and 
storing them in a user-programmed ROM chip. 
once the chip has been programmed, the PROM 
becomes a ROM i.e. the information recorded in it can 
only be read
 Once information is stored in ROM or PROM chip it cannot be 
altered. 
 EPROM alters this problem 
 It is possible to erase information stored in an EPROM chip and 
the chip can be reprogrammed to store new information. 
 Often used by Researcher and Developer personnel 
 When EPROM is in used, Information stored can only be read 
 Information remains in chip until it is erased
 A very special high speed memory is sometimes used to 
increased the speed of processing by making current 
programs and data available to the CPU at a rapid rate. 
 The CPU speeds are quite high compared to the access 
time of main memory. 
 Used to compensate for the mismatch in operating 
speeds between CPU and main memory whose 
 Access time is closed to the processing speed of the 
CPU.
1.MAGNETIC TAPE 
 Storage medium for large data that are accessed and 
processed sequentially. 
 Can also be erased and reused indefinitely. 
 Storage capacity of a tape = Data recording density * 
length 
 Data recording density refers to the amount of data that 
can be stored on a given length of tape. 
 Mounted on a tape drive before it can be used for 
reading/writing of information.
 It is a thin circular plate made of metal or plastic 
 Coated on both sides with a recording material that can 
be magnetized 
 Direct-access secondary storage device. 
 Most popular on-line secondary storage device. 
 Old data are erased automatically by recording new data 
 Stored data can be read many times without affecting 
data
I. FLOPPY DISK or DISKETTES: 
 Floppy disk is a flat, circular piece of flexible plastic 
coated with magnetic oxide. 
 So called because they are made of flexible plastic 
plates that can bend. 
 Introduced by IBM in 1972 and are now produced in 
various sizes and capacities by many manufacturers. 
 3 ½ inch floppy disk commonly used 
 High density storage capacity is 2.88MB.
 Primary on-line secondary storage device for most 
computer systems today 
 TYPES OF HARD DISKS: 
 ZIP/Bernoulli Disks: It consists of a single hard disk 
platter encased in a plastic cartridge. 100MB 
 Disk pack: It consists of multiple (two or more) hard disk 
platters mounted on a single central shaft. All the disks 
revolve together at the same speed 
 Winchester disk :Consists of multiple hard disk platters 
mounted on a single central shaft. However, unlike a disk 
pack drive, a Winchester disk drive is of fixed type i.e. its 
hard disk platters and the disk drive are sealed together
 A relatively new secondary storage medium. 
 It a promising random access medium for high capacity 
secondary storage . 
 Can store extremely large amount of data in a limited space. 
 Types of Optical Disk: 
a. CD-ROM: Compact Disk- Read Only Memory. 
b. WORM Disk/ CD- Recordable (CD-R) disks: As the name 
implies, data can be written only one on a WORM disk but 
can be read many times . 
c. CD Read/Write (CD-RW) disk: similar to WORM disk with the 
exception that you can erase the previous content and write 
on it multiple time.
 Designed primarily to store and distribute movies. 
 However, it is fast becoming mainstream optical disk as 
prices are reducing and need for large capacity storage is 
increasing. 
 It is similar to CD-ROM in principle but denser in recording 
data. 
 Storage capacity of single layer disk is of 4.7 GB, and 
double-layer disk is 8.5 GB 
 DVD has enough space to store movie and support multi-lingual 
audio, multiple camera angles, etc.
 With the advent of efficient manufacturing technologies, 
price of memory chips has fallen considerably. As a 
result a new breed of secondary storage devices has 
been introduced that not only provides storage but also 
applications on top like music player etc. 
I. Flash Drive (Pen Drive): 
 Compact device of the size of a pen comes in various 
shapes and stylish design. 
 One can read, write, copy, delete and move data from 
the computer’s hard disk drive to flash drive or from the 
flash drive to the hard disk drive. 
 Storage capacity are 8 MB, 16 MB, 64 MB, 128 MB, 256 
MB,512 MB,1 GB, 2 GB, 4 GB, and 8GB.
 Flash memory based cards are available as removable 
storage device in different types of electronic 
equipment. 
 Some of the most popular ones are Secure Digital (SD) 
and Multimedia Card (MMC). 
 Storage capacity ranges from 8 MB to 2 GB. 
 In addition to computers, these cards are used in 
various types of digital devices such as digital camera 
and cell phone.
 Huge storage capacity and very small cost per bit stored. 
 Use multiple unit of a storage media (such as multiple disks, 
multiple tapes, multiple CD-ROM etc) as a single storage device. 
 TYPES OF MASS STORAGE DEVICES:- 
DISK ARRAY:A set of hard disks, hard disk drive and a 
controller mounted in a single box. 
AUTOMATED TAPE LIBRARY: A set of magnetic tape, magnetic 
drives, and a controller mounted in a single unit.CD-ROM 
Juke box: A set of CD-ROM Disks and Drives, and a controller 
mounted in a single unit.
Thus, Memory storage is among the main part of the 
computer system, its storing ability provides a user with 
data and information even after many years. Without 
memory execution processes would be difficult. 
SOURCES: 
I. Sinha,P.K,2007, Computer Fundamentals,BPB 
Publications, pg. 111-144 
II. Internet

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
Ram & rom
Ram & romRam & rom
Ram & rom
 
Primary memory (main memory)
Primary memory (main memory)Primary memory (main memory)
Primary memory (main memory)
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Secondary Storage
Secondary StorageSecondary Storage
Secondary Storage
 
Presentation on memory
Presentation on memoryPresentation on memory
Presentation on memory
 
Random Access Memory ppt
Random Access Memory pptRandom Access Memory ppt
Random Access Memory ppt
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Ram & rom memories
Ram & rom memoriesRam & rom memories
Ram & rom memories
 
RAM :A primary Memory
RAM :A primary MemoryRAM :A primary Memory
RAM :A primary Memory
 
ROM(Read Only Memory )
ROM(Read Only Memory )ROM(Read Only Memory )
ROM(Read Only Memory )
 
computer memory and memory module
computer memory and memory modulecomputer memory and memory module
computer memory and memory module
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
COMPUTER STORAGE
COMPUTER STORAGECOMPUTER STORAGE
COMPUTER STORAGE
 
Types of Storage Devices
Types of Storage DevicesTypes of Storage Devices
Types of Storage Devices
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Ram presentation
Ram presentationRam presentation
Ram presentation
 
Storage devices
Storage devicesStorage devices
Storage devices
 

Destacado

Destacado (20)

Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Presentation on Computer Memory
Presentation on Computer Memory Presentation on Computer Memory
Presentation on Computer Memory
 
Types of Memories
Types of MemoriesTypes of Memories
Types of Memories
 
Computer memory in general
Computer memory in generalComputer memory in general
Computer memory in general
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Computer memory
Computer memoryComputer memory
Computer memory
 
1250438
12504381250438
1250438
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
Human Memory (Psychology)
Human Memory (Psychology)Human Memory (Psychology)
Human Memory (Psychology)
 
computer memory
computer memorycomputer memory
computer memory
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Computer Memory Systems
Computer Memory SystemsComputer Memory Systems
Computer Memory Systems
 
CPU (Central Processing Units)
CPU (Central Processing Units)CPU (Central Processing Units)
CPU (Central Processing Units)
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Ms word excel power point
Ms word excel power pointMs word excel power point
Ms word excel power point
 
component of computer
component of computercomponent of computer
component of computer
 
Computer Memory Device Supplier, ASAP Distribution
Computer Memory Device Supplier, ASAP DistributionComputer Memory Device Supplier, ASAP Distribution
Computer Memory Device Supplier, ASAP Distribution
 
Disk operating system
Disk operating systemDisk operating system
Disk operating system
 
register
registerregister
register
 

Similar a Types of Computer Memory and Storage Devices Explained

Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devisesdevaki123
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentalsRaj vardhan
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devicesPichano Kikon
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage mediaMirza Ćutuk
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentationaaravSingh41
 
Memory and storage
Memory and storageMemory and storage
Memory and storageTapan Khilar
 
secondry storage ahsan warraich
secondry storage ahsan warraichsecondry storage ahsan warraich
secondry storage ahsan warraichahsaniftikhar19
 
EXTERNAL STORAGE OF A COMPUTER SYSTEM
EXTERNAL STORAGE OF A COMPUTER SYSTEMEXTERNAL STORAGE OF A COMPUTER SYSTEM
EXTERNAL STORAGE OF A COMPUTER SYSTEMPalash Bhatt
 
Memory & storage devices
Memory & storage devicesMemory & storage devices
Memory & storage devicesHamza Mughal
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Afaq Siddiqui
 

Similar a Types of Computer Memory and Storage Devices Explained (20)

Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devises
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
Primary and secondary storage devices
Primary and secondary storage devicesPrimary and secondary storage devices
Primary and secondary storage devices
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
 
Memory devices
Memory devicesMemory devices
Memory devices
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
 
Memory
MemoryMemory
Memory
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Computer memory presentation
Computer memory presentationComputer memory presentation
Computer memory presentation
 
Memory system of a compture
Memory system of a comptureMemory system of a compture
Memory system of a compture
 
computer storage
computer storagecomputer storage
computer storage
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
secondry storage ahsan warraich
secondry storage ahsan warraichsecondry storage ahsan warraich
secondry storage ahsan warraich
 
Memory
MemoryMemory
Memory
 
computer Unit 5
computer Unit 5computer Unit 5
computer Unit 5
 
Storage devices
Storage devicesStorage devices
Storage devices
 
EXTERNAL STORAGE OF A COMPUTER SYSTEM
EXTERNAL STORAGE OF A COMPUTER SYSTEMEXTERNAL STORAGE OF A COMPUTER SYSTEM
EXTERNAL STORAGE OF A COMPUTER SYSTEM
 
Memory & storage devices
Memory & storage devicesMemory & storage devices
Memory & storage devices
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
 

Más de Swarnima Tiwari

Más de Swarnima Tiwari (20)

Problems and Prospects of Border Trade between North east India and Bangladesh
Problems and Prospects of Border Trade between North east India and BangladeshProblems and Prospects of Border Trade between North east India and Bangladesh
Problems and Prospects of Border Trade between North east India and Bangladesh
 
Mbfm ppt
Mbfm pptMbfm ppt
Mbfm ppt
 
Money and banking ppt
Money and banking pptMoney and banking ppt
Money and banking ppt
 
Money & banking
Money & bankingMoney & banking
Money & banking
 
INDIAN FINANCIAL SYSTEM
INDIAN FINANCIAL SYSTEMINDIAN FINANCIAL SYSTEM
INDIAN FINANCIAL SYSTEM
 
mbfm ppt
 mbfm ppt mbfm ppt
mbfm ppt
 
Money and banking
Money and bankingMoney and banking
Money and banking
 
Mission & vision (business strategy policy)
Mission & vision (business strategy policy)Mission & vision (business strategy policy)
Mission & vision (business strategy policy)
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 
Adverting & sales promotion
Adverting & sales promotionAdverting & sales promotion
Adverting & sales promotion
 
Mba 2
Mba 2Mba 2
Mba 2
 
Economicimpactoftourism 120712024901-phpapp01
Economicimpactoftourism 120712024901-phpapp01Economicimpactoftourism 120712024901-phpapp01
Economicimpactoftourism 120712024901-phpapp01
 
Bthm
BthmBthm
Bthm
 
Bca
BcaBca
Bca
 
Bca
BcaBca
Bca
 
Bba 2nd
Bba 2ndBba 2nd
Bba 2nd
 
Presentation1.ppt ppm 03
Presentation1.ppt ppm 03Presentation1.ppt ppm 03
Presentation1.ppt ppm 03
 
MARKETING
MARKETINGMARKETING
MARKETING
 
MARKETING PROJECT
MARKETING PROJECTMARKETING PROJECT
MARKETING PROJECT
 
Findings and analysis of birla sun life
Findings and analysis of birla sun lifeFindings and analysis of birla sun life
Findings and analysis of birla sun life
 

Último

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 

Último (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 

Types of Computer Memory and Storage Devices Explained

  • 1. Presented by: Dashembha Dohtdong Roll NO: 0810,Mba
  • 2. 1. Computer memory 2. Storage Evaluation Criteria 3. Primary memory 4. Secondary memory 5. Types of Primary memory 6. Types of Secondary memory 7. Contents 8. Sources
  • 3. Data and instructions entered into a computer systems through input units have to be stored inside the computer before actual processing starts. Similarly results produced by a computer after processing have to be kept somewhere inside the computer system before being passed on to an output unit. Moreover a computer must also preserve intermediate results for ongoing processing. Storage unit holdS :  Data and instructions required for processing  Intermediate results of processing  Results for output
  • 4.  Storage Capacity: Amount of data that can be stored.  Access Time: Time required to locate and retrieved stored data from the storage unit in response to a program instruction  Cost Per Bit of Storage: Cost of a storage unit for a given storage capacity.  Volatile: Lost of stored data when power is turn off or interrupted.  Random Access: If the time taken to access a piece of data from a storage unit is independent of the location of the data in the storage unit it is called random access storage or random access memory(RAM), pseudo-random access (access time is nearly same for all location but not exactly same) or sequential access (access time depends on the location of the data) property.
  • 5. 1.Primary/main memory:  Used to hold pieces of program instructions and data, intermediate results of processing, recently produced results of those job(s) on which the computer is currently working.  These pieces of information are represented electronically in the main memory chip circuitry and while it remains in the main memory, central processing unit can access it directly at a very high speed.  Its volatile in nature.  limited storage capacity  It have random access property.
  • 6.  Holds the program instructions, data and information of those jobs on which the computer system is currently not working but needs to hold them for processing later  Store large volume of data on permanent basis  It is much cheaper than primary memory.  Non-volatile in nature  Have either pseudo-random access (access time is nearly same for all location but not exactly same) or sequential access (access time depends on the location of the data) property
  • 7. I. RAM: Randomly select and used any location of this memory to directly store and retrieve data and instructions. II. ROM:A non-volatile memory chip in which data is stored permanently and cannot be altered by usual programs. III. PROM:A user-programmed ROM is one in which a user can load and store ‘read- only’ programs and data i.e. it is possible for a user to customize’ a system by converting his/her programs to micro-programs and storing them in a user-programmed ROM chip. once the chip has been programmed, the PROM becomes a ROM i.e. the information recorded in it can only be read
  • 8.  Once information is stored in ROM or PROM chip it cannot be altered.  EPROM alters this problem  It is possible to erase information stored in an EPROM chip and the chip can be reprogrammed to store new information.  Often used by Researcher and Developer personnel  When EPROM is in used, Information stored can only be read  Information remains in chip until it is erased
  • 9.  A very special high speed memory is sometimes used to increased the speed of processing by making current programs and data available to the CPU at a rapid rate.  The CPU speeds are quite high compared to the access time of main memory.  Used to compensate for the mismatch in operating speeds between CPU and main memory whose  Access time is closed to the processing speed of the CPU.
  • 10. 1.MAGNETIC TAPE  Storage medium for large data that are accessed and processed sequentially.  Can also be erased and reused indefinitely.  Storage capacity of a tape = Data recording density * length  Data recording density refers to the amount of data that can be stored on a given length of tape.  Mounted on a tape drive before it can be used for reading/writing of information.
  • 11.  It is a thin circular plate made of metal or plastic  Coated on both sides with a recording material that can be magnetized  Direct-access secondary storage device.  Most popular on-line secondary storage device.  Old data are erased automatically by recording new data  Stored data can be read many times without affecting data
  • 12. I. FLOPPY DISK or DISKETTES:  Floppy disk is a flat, circular piece of flexible plastic coated with magnetic oxide.  So called because they are made of flexible plastic plates that can bend.  Introduced by IBM in 1972 and are now produced in various sizes and capacities by many manufacturers.  3 ½ inch floppy disk commonly used  High density storage capacity is 2.88MB.
  • 13.  Primary on-line secondary storage device for most computer systems today  TYPES OF HARD DISKS:  ZIP/Bernoulli Disks: It consists of a single hard disk platter encased in a plastic cartridge. 100MB  Disk pack: It consists of multiple (two or more) hard disk platters mounted on a single central shaft. All the disks revolve together at the same speed  Winchester disk :Consists of multiple hard disk platters mounted on a single central shaft. However, unlike a disk pack drive, a Winchester disk drive is of fixed type i.e. its hard disk platters and the disk drive are sealed together
  • 14.  A relatively new secondary storage medium.  It a promising random access medium for high capacity secondary storage .  Can store extremely large amount of data in a limited space.  Types of Optical Disk: a. CD-ROM: Compact Disk- Read Only Memory. b. WORM Disk/ CD- Recordable (CD-R) disks: As the name implies, data can be written only one on a WORM disk but can be read many times . c. CD Read/Write (CD-RW) disk: similar to WORM disk with the exception that you can erase the previous content and write on it multiple time.
  • 15.  Designed primarily to store and distribute movies.  However, it is fast becoming mainstream optical disk as prices are reducing and need for large capacity storage is increasing.  It is similar to CD-ROM in principle but denser in recording data.  Storage capacity of single layer disk is of 4.7 GB, and double-layer disk is 8.5 GB  DVD has enough space to store movie and support multi-lingual audio, multiple camera angles, etc.
  • 16.  With the advent of efficient manufacturing technologies, price of memory chips has fallen considerably. As a result a new breed of secondary storage devices has been introduced that not only provides storage but also applications on top like music player etc. I. Flash Drive (Pen Drive):  Compact device of the size of a pen comes in various shapes and stylish design.  One can read, write, copy, delete and move data from the computer’s hard disk drive to flash drive or from the flash drive to the hard disk drive.  Storage capacity are 8 MB, 16 MB, 64 MB, 128 MB, 256 MB,512 MB,1 GB, 2 GB, 4 GB, and 8GB.
  • 17.  Flash memory based cards are available as removable storage device in different types of electronic equipment.  Some of the most popular ones are Secure Digital (SD) and Multimedia Card (MMC).  Storage capacity ranges from 8 MB to 2 GB.  In addition to computers, these cards are used in various types of digital devices such as digital camera and cell phone.
  • 18.  Huge storage capacity and very small cost per bit stored.  Use multiple unit of a storage media (such as multiple disks, multiple tapes, multiple CD-ROM etc) as a single storage device.  TYPES OF MASS STORAGE DEVICES:- DISK ARRAY:A set of hard disks, hard disk drive and a controller mounted in a single box. AUTOMATED TAPE LIBRARY: A set of magnetic tape, magnetic drives, and a controller mounted in a single unit.CD-ROM Juke box: A set of CD-ROM Disks and Drives, and a controller mounted in a single unit.
  • 19. Thus, Memory storage is among the main part of the computer system, its storing ability provides a user with data and information even after many years. Without memory execution processes would be difficult. SOURCES: I. Sinha,P.K,2007, Computer Fundamentals,BPB Publications, pg. 111-144 II. Internet