際際滷

際際滷Share a Scribd company logo
TYPES OF MEMORY 
Main Memory Secondary
Memory
ROM (Read
Only Memory)
RAM (Random
Access Memory)
HARD
DISC
FLOPPY
DISCS
CD
ROMS
DVDS
Memory
Units
8 Bits = 1 Byte
2^10 or 1024 bytes = 1 Kilo byte
or 1 KB
2^10 OR 1024 KB = 1 Mega byte or
1 MB
2^10 OR 1024 MB = 1 Gega byte or
1 GB
2^10 OR 1024 GB = 1 Tera byte or
1 TB
SOFTWARE
SSystem Softwares
(Software that controls
internal computer operations)
Application Softwares (Set of
programs necessary to carry out
operations for a specified
application.)
Operating
System
Acts as an
interface
between
user and
hardware
Language
Processor
It converts
our Program
into
machine
language.
Device
Drivers
Provide
interface
between
OS and
hardware.
Utilities
Perform
Housekeeping
functions.
E.g. virus
removal
Packages
General Utilities
softwares; mostly
software suites
Customized
Softwares
Tailor made
software
according to a
users need.
TYPES OF SOFTWARES ..
Ad

Recommended

Creating ghost in windows
Creating ghost in windows
bhuruptdr
Computer Basics
Computer Basics
nhumar
悋惠 悋忰悋愕惡
悋惠 悋忰悋愕惡
Rayaor
Integrated Technology Unit Presentation
Integrated Technology Unit Presentation
Poom Chitnuchtaranon
Basics of Computer
Basics of Computer
Manish Goswami
Computer components
Computer components
Md. Sohanur Rahman
Hardware it presentation
Hardware it presentation
syedamarziazaidi
EDP powerpoint
EDP powerpoint
klayd
Insides Of A Computer
Insides Of A Computer
Josh Mathew
Lubuntu a Lightweight Desktop
Lubuntu a Lightweight Desktop
mahrukh rafique
Ubuntu 10.04 Installation Guide
Ubuntu 10.04 Installation Guide
Ranjith Siji
Desktop environments
Desktop environments
hindalfalasi
Parts of a computer
Parts of a computer
Litigante Independiente
It comp basics
It comp basics
A B
惺惘惷 悖惠惺惘 惺 忰悋愕惡 04
惺惘惷 悖惠惺惘 惺 忰悋愕惡 04
悋悵 忰悋愕惡悸
Download Myboot disk
Download Myboot disk
Roach
Common componets
Common componets
Tapz Mashanga
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
Gene Carboni
Computer components
Computer components
sophie07
Remote control system (rcs)
Remote control system (rcs)
Shekh Md Mehedi Hasan
Components of the computer
Components of the computer
RainishDhiman
Asiabsdcon2013
Asiabsdcon2013
krispcbsd
Technical Presentation of Computer Components
Technical Presentation of Computer Components
Daniel Moore
Operating system
Operating system
rocalima1
Windows 7
Windows 7
shikha23dec
Computer Parts Presentation
Computer Parts Presentation
Stacey Robinson
Cyber Threat Hunting - Hunting in Memory at Scale
Cyber Threat Hunting - Hunting in Memory at Scale
Infocyte
Internal parts
Internal parts
sankarsrivatsa
SESSION 9 - Storage on the computer .pdf
SESSION 9 - Storage on the computer .pdf
Maxwell Musonda
computer storage
computer storage
Dipankar Dutta

More Related Content

What's hot (20)

Insides Of A Computer
Insides Of A Computer
Josh Mathew
Lubuntu a Lightweight Desktop
Lubuntu a Lightweight Desktop
mahrukh rafique
Ubuntu 10.04 Installation Guide
Ubuntu 10.04 Installation Guide
Ranjith Siji
Desktop environments
Desktop environments
hindalfalasi
Parts of a computer
Parts of a computer
Litigante Independiente
It comp basics
It comp basics
A B
惺惘惷 悖惠惺惘 惺 忰悋愕惡 04
惺惘惷 悖惠惺惘 惺 忰悋愕惡 04
悋悵 忰悋愕惡悸
Download Myboot disk
Download Myboot disk
Roach
Common componets
Common componets
Tapz Mashanga
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
Gene Carboni
Computer components
Computer components
sophie07
Remote control system (rcs)
Remote control system (rcs)
Shekh Md Mehedi Hasan
Components of the computer
Components of the computer
RainishDhiman
Asiabsdcon2013
Asiabsdcon2013
krispcbsd
Technical Presentation of Computer Components
Technical Presentation of Computer Components
Daniel Moore
Operating system
Operating system
rocalima1
Windows 7
Windows 7
shikha23dec
Computer Parts Presentation
Computer Parts Presentation
Stacey Robinson
Cyber Threat Hunting - Hunting in Memory at Scale
Cyber Threat Hunting - Hunting in Memory at Scale
Infocyte
Internal parts
Internal parts
sankarsrivatsa
Insides Of A Computer
Insides Of A Computer
Josh Mathew
Lubuntu a Lightweight Desktop
Lubuntu a Lightweight Desktop
mahrukh rafique
Ubuntu 10.04 Installation Guide
Ubuntu 10.04 Installation Guide
Ranjith Siji
Desktop environments
Desktop environments
hindalfalasi
It comp basics
It comp basics
A B
惺惘惷 悖惠惺惘 惺 忰悋愕惡 04
惺惘惷 悖惠惺惘 惺 忰悋愕惡 04
悋悵 忰悋愕惡悸
Download Myboot disk
Download Myboot disk
Roach
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
Gene Carboni
Computer components
Computer components
sophie07
Components of the computer
Components of the computer
RainishDhiman
Asiabsdcon2013
Asiabsdcon2013
krispcbsd
Technical Presentation of Computer Components
Technical Presentation of Computer Components
Daniel Moore
Operating system
Operating system
rocalima1
Computer Parts Presentation
Computer Parts Presentation
Stacey Robinson
Cyber Threat Hunting - Hunting in Memory at Scale
Cyber Threat Hunting - Hunting in Memory at Scale
Infocyte

Similar to Flowcharts (20)

SESSION 9 - Storage on the computer .pdf
SESSION 9 - Storage on the computer .pdf
Maxwell Musonda
computer storage
computer storage
Dipankar Dutta
Unit-II Memory Interfacing.pptx
Unit-II Memory Interfacing.pptx
pvg123456
Computer memory
Computer memory
Mrjonesit
Storing data ch 4
Storing data ch 4
Khan Yousafzai
STORAGE_DEVICES - Copy coooooooopyyyy.ppt
STORAGE_DEVICES - Copy coooooooopyyyy.ppt
narifmsit18seecs
STORAGE ppt /presentation for clg project
STORAGE ppt /presentation for clg project
cardsfish64
What is memory
What is memory
AzaanNaqvi
Computer Memory
Computer Memory
Sweta Kumari Barnwal
Storage devices
Storage devices
Chitranshi Haridas
Chapter1 9-07
Chapter1 9-07
punjab universty
Memory Unit
Memory Unit
DAVIS THOMAS
primary memory
primary memory
Ramya Kotyan
Chapter1 9-07
Chapter1 9-07
dereennn
Hardware
Hardware
amal312
Computer memory
Computer memory
UtsavMandaviya
Storage devices
Storage devices
latifah2001
Data storage
Data storage
tonysusu
Computer memory and basics of computers understanding
Computer memory and basics of computers understanding
SuprityDas
Complete Computer Memory Information
Complete Computer Memory Information
Jasur Ahmadov
SESSION 9 - Storage on the computer .pdf
SESSION 9 - Storage on the computer .pdf
Maxwell Musonda
Unit-II Memory Interfacing.pptx
Unit-II Memory Interfacing.pptx
pvg123456
Computer memory
Computer memory
Mrjonesit
STORAGE_DEVICES - Copy coooooooopyyyy.ppt
STORAGE_DEVICES - Copy coooooooopyyyy.ppt
narifmsit18seecs
STORAGE ppt /presentation for clg project
STORAGE ppt /presentation for clg project
cardsfish64
What is memory
What is memory
AzaanNaqvi
Chapter1 9-07
Chapter1 9-07
dereennn
Hardware
Hardware
amal312
Storage devices
Storage devices
latifah2001
Data storage
Data storage
tonysusu
Computer memory and basics of computers understanding
Computer memory and basics of computers understanding
SuprityDas
Complete Computer Memory Information
Complete Computer Memory Information
Jasur Ahmadov
Ad

Recently uploaded (20)

FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Edge-banding-machines-edgeteq-s-200-en-.pdf
Edge-banding-machines-edgeteq-s-200-en-.pdf
AmirStern2
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
Edge AI and Vision Alliance
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
Turning the Page How AI is Exponentially Increasing Speed, Accuracy, and Ef...
Turning the Page How AI is Exponentially Increasing Speed, Accuracy, and Ef...
Impelsys Inc.
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Edge AI and Vision Alliance
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
Safe Software
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Edge-banding-machines-edgeteq-s-200-en-.pdf
Edge-banding-machines-edgeteq-s-200-en-.pdf
AmirStern2
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
From Enterprise to Makers: Driving Vision AI Innovation at the Extreme Edge,...
Edge AI and Vision Alliance
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
Turning the Page How AI is Exponentially Increasing Speed, Accuracy, and Ef...
Turning the Page How AI is Exponentially Increasing Speed, Accuracy, and Ef...
Impelsys Inc.
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Key Requirements to Successfully Implement Generative AI in Edge DevicesOpt...
Edge AI and Vision Alliance
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
Safe Software
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
Ad

Flowcharts

  • 1. TYPES OF MEMORY Main Memory Secondary Memory ROM (Read Only Memory) RAM (Random Access Memory) HARD DISC FLOPPY DISCS CD ROMS DVDS Memory Units 8 Bits = 1 Byte 2^10 or 1024 bytes = 1 Kilo byte or 1 KB 2^10 OR 1024 KB = 1 Mega byte or 1 MB 2^10 OR 1024 MB = 1 Gega byte or 1 GB 2^10 OR 1024 GB = 1 Tera byte or 1 TB
  • 2. SOFTWARE SSystem Softwares (Software that controls internal computer operations) Application Softwares (Set of programs necessary to carry out operations for a specified application.) Operating System Acts as an interface between user and hardware Language Processor It converts our Program into machine language. Device Drivers Provide interface between OS and hardware. Utilities Perform Housekeeping functions. E.g. virus removal Packages General Utilities softwares; mostly software suites Customized Softwares Tailor made software according to a users need. TYPES OF SOFTWARES ..