1 week ago

Computing Academy GCSE Computer Science

ROM and Virtual Memory

ROM and Virtual Memory Read Only Memory (ROM) Every time you switch on your computer it performs a sequence of tasks such as checking that all of the hardware is present, checking that a keyboard and mouse is connected and checking to ensure that the HDD or SSD contains the operating system; this is known as a boot sequence. We know that RAM is volatile, so once the computer is turned off, everything in RAM is wiped. Part of the boot sequence involves checking the HDD or SSD and we know that these storage systems are too slow, so the instructions necessary to perform the boot sequence can’t be stored here. 33

This is where Read Only Memory (ROM) comes in. ROM is non-volatile so it stores data even when the power is turned off. ROM is also very quick which is important when we’re trying to boot up a computer and don’t want to be kept waiting. Most computers have a ROM chip built into the motherboard which stores this boot sequence. When you turn on a computer the ROM chip gets to work, performs the necessary checks and begins to boot the operating system. Virtual Memory Computers load data and instructions into RAM before passing them to the CPU for processing. RAM is used as HDDs and SSDs are too slow. Sometimes, however, computers do not have enough RAM to cope with all of the jobs we are trying to do. When this happens, RAM needs to dump some of the data it has stored that isn’t currently being used into Virtual Memory in order to free up space in RAM for more urgent jobs. When necessary the operating system designates part of the HDD or SSD as Virtual Memory that can be used by RAM as a temporary extension. HDDs and SSDs are slow in comparison to RAM, so computers using Virtual Memory will suffer from a significant reduction in performance. Users will notice this as they try and switch between windows and applications. 34

Brookshear - Computer Science - An Overview 9e - Computarium LCD
Computer Science- An Overview (12th Global Edition)
Defensive Database Programming with SQL ... - Red Gate Software
ASAM solutions guide 2011 - Science und Computing AG
Computer Science @ Virginia Tech - Computer Science at Virginia ...
National Academy of Sciences - PCIC Personal Computing Industry ...
Education Manual - School of Computer Science Raspberry Pi ...
1 - Department of Computer Science | University of Pittsburgh
Computer Science ~ Contents - McGraw-Hill Books
maps and algorithms - TAMU Computer Science Faculty Pages
CSE 114 – Computer Science I Lecture 1: Introduction
4/10/08 Backup and Recovery - Computer Science
Survey of Computer Science - Mathematics and Computer Science
COMPUTER SCIENCE - Jones & Bartlett Learning
COMPUTER SCIENCE PROGRAM - Polytechnic University
download - Department of Computer Science, Yonsei
CSCE 314 Programming Languages - TAMU Computer Science ...
Computer network
Survey of Computer Science - Mathematics and Computer Science
Computer Programming with GNU Smalltalk - Free
Folie 1 - Faculty of Computer Science
Extreme Programming - Seidenberg School of Computer Science ...
Idenity Theft and Online Safety - Garfield Computer Science
Summer Programs PowerPoint (PDF) - Garfield Computer Science
Computer Networks and Distributed Systems as a Basis for ...
bits - Mathematics and Computer Science