Computer Memory2
Computer Memory2
syllabus
Chapter 2 2023-24
Computer Memory
Informatics Practices
Class XI ( As per CBSE Board)
Types of memory
The advantages of cache memory are as follows −
• Cache memory is faster than main memory.
• It consumes less access time as compared to main
memory.
• It stores the program that can be executed within a short
period of time.
• It stores data for temporary use.
Type Types of RAM are static RAM and Types of ROM are PROM,
dynamic RAM. EPROM, EEPROM.
A hard disk is a set of stacked disks. Each disk has data recorded
electromagnetically in concentric circles, or tracks, on the disk
Hard Drive Types
1. Parallel Advanced Technology Attachment (PATA)
2. Serial ATA (SATA)
3. Small Computer System Interface (SCSI)
4. Solid State Drives (SSD)
Upto 12 TB sized HDD is available in the market
Visit : python.mykvs.in for regular updates
Computer Memory
Secondary Storage Devices
A Compact disc read-only memory (CD-ROM)- is a storage device that
can be read but not written to. The surface of a CD is made of a
polycarbonate layer with molded spiral tracks on the top. The data
are stored on the CD as a series of minute grooves which are known
as 'pits' encoded on these spiral tracks. The areas between the 'pits'
are known as 'lands'. A CD burner is used to write (burn) the data on a
CD.A sensor reads data through light(laser) reflection.
Hard disk – If hdd circuit is damaged then it will be replaced and data
will be recovered,this procedure is easy but if data loss from disk track
then it become harder to recover.if files are removed due to
command given mistakenly or formatted mistakenly and no data then
after over written then these can be recovered from recua like
software or we can approach hdd repair & recovery company for the
same ,they work in specialized environment ,specialist open hdd and
recover data bitwise that is too much harder process.
Security issue
RAM– RAM is used to store sensitive non-persistent information in a
lot of cases. Encryption keys would be a common example.Sometimes
it is possible to remove RAM and place it into another device to dump
the contents.
ROM - Customs Roms are open-source and they have all chance to
steal data. But the developers stick to Their ethics and refrain from
such practices. Also security teams watch what kind of additions are
made to the source codes.
Hard disk -Once our computer becomes infected with malware, a
cybercriminal can hijack our computer and do almost anything they
wish. A lot of malware these days is programmed to seek out valuable
or sensitive data and send it back to the criminals.