Chapter 3: Where are programs and data stored?. What kinds of memory are there? The main memory The main memory –ROM: Read-only memory Store permanently.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Two Downloading and Installing Software.
Advertisements

Lesson 9 Types of Storage Devices.
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Describing Storage Devices Store data when computer is off Two processes –Writing data –Reading data Storage terms –Media is the material storing data.
Types Of Storage Device
Lesson 3: Working with Storage Systems
RAM Random access memory, or RAM for short, is active during the processing function. RAM is often referred to as “temporary memory.” RAM consists of electronic.
Introduction to Computers
What Is A Computer System?
Intermediate GNVQ ICT Backing Storage Backing storage is used to store programs and data when they are not being used or when a computer is switched off.
Computer Parts There are many parts that work together to make a computer work.
Format Scandisk Defragmentation Antivirus Compression Software
Computer Storage Devices Principles of Information Technology Lytle High School Click to continue.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Passage Three Storage Devices. Training target: In this part , you should try your best to form good reading habits. In order to avoid your ill habits.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Standard Grade Computing STORAGE DEVICES CHAPTER 18 COMPUTER STUDIES Standard Grade.
The Operating System The operation system (OS) is a set of programs that coordinates: Hardware functions Interaction between application software and computer.
ASHIMA KALRA.  Hard disks.Hard disks.  Floppy disks.Floppy disks.  CD ROMs.CD ROMs.  DVDs.DVDs.
Video Following is a video of what can happen if you don’t update your security settings! security.
CIS 105 Concepts and Terminology Unit 3 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit Three.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter 3 Computer Hard ware
Essential Computer Concepts
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
Chapter 2: CPU &Data Storage. CPU Each computer has at least one CPU Each computer has at least one CPU CPU execute instructions to carry out tasks –
Chapter 4: operating systems. What is an operating system? A program or collection of programs that coordinate computer usage among users and handle common.
INFO1 – Practical problem solving in the digital world
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. Computers: Information Technology in Perspective.
Software Utilities Pages 65 to 73 Looking After Your Computer Nick Sims.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
GCSE Information Technology Storing data Data storage devices can be divided into 2 main categories: Backing storage is used to store programs and data.
AS Computing Storage devices. Primary storage  A computer’s main memory (RAM) is known as primary memory.  Primary memory is volatile; when the computer.
Copyright Prentice-Hall, Inc Storing & Retrieving Information Chapter 7.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Chidambaranathan C.M SRM University,Haryana. Memory:- As the word implies “memory” means the place where we have to store any thing, this is very essential.
OCR GCSE Computing © Hodder Education 2013 Slide 1 OCR GCSE Computing Chapter 2: Memory.
1 Introduction to Computers By Masseta ICT Dept. Mzumbe University.
Data Storage. 3 types of storage to remember ROM RAM Secondary or backing storage.
Memory The CPU in the computer fetches data and instructions from memory to process. This type of memory is called primary memory and it is the only memory.
Practical PC, 7 th Edition Chapter 4: File Basics.
Parts of the computer.
1 Course Title: IT IN BUSINESS Course Instructor: ADEEL ANJUM Chapter No: 04 1 BY ADEEL ANJUM (MCS, CCNA,WEB DEVELOPER)
Chapter 3: Where are programs and data Stored?. How important is this chapter to understanding how a computer works? 7 (on a scale of 1-10 with 10 being.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Review of Computer System Organization. Computer Startup For a computer to start running when it is first powered up, it needs to execute an initial program.
STORAGE DEVICES Introduction Comparision Storage Hierarchy Slide 1.
Unit 1: Computing Fundamentals. Computer Tour-There are 7 major components inside a computer  Write down each major component as it is discussed.  Watch.
Storage devices 1. Storage Storage device : stores data and programs permanently its retained after the power is turned off. The most common type of storage.
Memory The term memory is referred to computer’s main memory, or RAM (Random Access Memory). RAM is the location where data and programs are stored (temporarily),
Learning Outcomes At the end of this lesson, students should be able to: Define storage State the types and functions of storage – primary storage RAM.
Storage of Data Letts Chapter 6. Introduction Any system needs to store both programs and data and requires: n a main store for fast access storage; n.
COMPUTER ORGANIZATION ANGELITO I. CUNANAN JR.. MEMORY MANAGEMENT  In multiuser, multitasking or multiprogramming system, memory must be specifically.
Copyright © 2003 Prentice Hall, Inc 1 Chapter 4 Storing Data: Electronic Filing Cabinets NEXT SLIDE.
Storage Devices. Diskette plastic flexible disk enclosed inside a tough plastic cover. Properties : - Diskettes are slow and have a low capacity (1,44.
Copyright Prentice Hall, Inc. 1 Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 5 Storing and Retrieving Information.
Chapter 2: Computer-System Structures
Introduction to Computers
Introduction to Computers
File Management.
Lesson Objectives Aims You should be able to:
McGraw-Hill Technology Education
GCSE OCR 3 Memory Computer Science J276 Unit 1
Computer Hardware Ms. Wade.
Lesson 9 Types of Storage Devices.
McGraw-Hill Technology Education
Objectives Describe the difference between RAM and ROM
5 Backing Storage Backing storage is used to store programs and data when they are not being used or when a computer is switched off. When programs and.
Presentation transcript:

Chapter 3: Where are programs and data stored?

What kinds of memory are there? The main memory The main memory –ROM: Read-only memory Store permanently instructions for system startup. Store permanently instructions for system startup. Its contents cannot be modified. Its contents cannot be modified. Its contents written by the manufacture Its contents written by the manufacture –RAM Transitory (volatile) memory – when the power is turned off, its contents is lost. Transitory (volatile) memory – when the power is turned off, its contents is lost. Applications and user data are temporarily stored here for processing. Applications and user data are temporarily stored here for processing. Contains operating system, programs being executed, and data being processed Contains operating system, programs being executed, and data being processed

What kinds of memory are there? Hard disks Hard disks –Permanent storage – its contents do not depend on power –Permanent, but not forever –Where applications are installed –Where user files are stored –Where virtual memory is located CDs CDs –Compact discs –Data are written to and read from using laser –Permanent storage –Read-only –Burn CDs – write once and read many

How hard disks work? Rigid circular steel platters with magnetic coating Rigid circular steel platters with magnetic coating Platters spin at high speed Platters spin at high speed Each surface is formatted into circular bands called tracks and each track is divided into segments called sectors Each surface is formatted into circular bands called tracks and each track is divided into segments called sectors Data are stored on the sectors Data are stored on the sectors Each surface has a read/write (R/W) head for reading and writing from/to the surface Each surface has a read/write (R/W) head for reading and writing from/to the surface To read from or write to a sector, the R/W head of each surface moves to the track and wait for the sector to spin under the R/W head and then read or write. To read from or write to a sector, the R/W head of each surface moves to the track and wait for the sector to spin under the R/W head and then read or write.

How hard disks work?

Read/Write heads

Virtual memory A technique for today’s computers to run many applications beyond the limit of the physical memory (RAM) A technique for today’s computers to run many applications beyond the limit of the physical memory (RAM) Virtual memory is part of the hard disk Virtual memory is part of the hard disk Often it uses the free space of the hard disk Often it uses the free space of the hard disk All programs that are being executed and data are being processed are all located in virtual memory. All programs that are being executed and data are being processed are all located in virtual memory.

Virtual memory Hard disk Data files And Applications Used space Free space Running programs and their data Virtual Memory

RAM and virtual memory Virtual memory You Workbench.limited space.hand reachable Workshop. Large. Has everything RAMCPU Your computer

When do data move? You want to use MS WORD to write a letter. You want to use MS WORD to write a letter. –MS Word and its application data are installed onto the hard disk –When you double-click the Word icon, Word is copied from the hard disk to virtual memory along with its application data –When you start using Word, part of Word is copied from virtual memory to RAM –The text you enter from keyboard is saved in RAM –When you save the letter, the text along with format info (bold, italic, etc) is saved into a file on the hard disk. –When Word exits, it is removed from RAM and virtual memory along all data related to it.

When do data move? What happens when no free space in RAM? What happens when no free space in RAM? –As you open more and more applications (multitasking) and/or enter more data, RAM may become all occupied –This is like your workbench is all covered by tools and materials. –The operating system moves some part of some applications to virtual memory to free up some RAM space –This is like you move some tools and materials from workbench to the walls of the workshop. –Now you can continue entering more data or opening more applications. –This is like you continue your work on workbench using newly freed space. –When you need a part of a program or a program that was moved to virtual memory, it may be swapped back in RAM with some part in RAM. –This is like you need a tool you moved to the walls earlier, you need to clear some space on workbench so you can move it back.

How much memory is enough? Virtual memory allows us to run applications that together need more than the available physical RAM Virtual memory allows us to run applications that together need more than the available physical RAM Virtual memory (hard disk) is much slower than main memory (RAM). Virtual memory (hard disk) is much slower than main memory (RAM). The more swapping between RAM and virtual memory, the slower of the system The more swapping between RAM and virtual memory, the slower of the system The more RAM (bigger workbench), the less likely swapping occurs The more RAM (bigger workbench), the less likely swapping occurs The more RAM, the faster the system The more RAM, the faster the system Stop applications that no longer needed, this frees the RAM space occupied by those applications  remove no longer needed tools from your workbench. Stop applications that no longer needed, this frees the RAM space occupied by those applications  remove no longer needed tools from your workbench.

Deleting a file vs. erasing it Deletion of a file Deletion of a file 1.Removes the record of the file from the corresponding directory 2.Marks that the various sectors of the file are now free Erasure of a file Erasure of a file 1.Writes over all information in the various sectors containing file data 2.Removes the record of the file from the corresponding directory 3.Marks that the various sectors of the file are now free Delete a file === throw it into a garbage can someone may steal it and read it someone may steal it and read it Erase a file === shred it no one can read it anymore no one can read it anymore

What is “defragment”

What are viruses? Unwanted and unanticipated programs Unwanted and unanticipated programs May damage a computer or degrade its performance May damage a computer or degrade its performance Viruses may appear: Viruses may appear: –As an attachment –In another program –In user data files (MS Word Macros) –On disk in a place that is routinely activated.

How to detect viruses? Anti-virus programs compare each file against known viruses Anti-virus programs compare each file against known viruses A computer may be set up in such a way that no disk files can be accessed until virus scanning has been completed. A computer may be set up in such a way that no disk files can be accessed until virus scanning has been completed. A new virus may not be known by the anti- virus program until the virus information is available to the anti-virus program A new virus may not be known by the anti- virus program until the virus information is available to the anti-virus program Be proactive in getting information of new viruses for the anti-virus program Be proactive in getting information of new viruses for the anti-virus program

How to protect yourself? Be sure anti-virus software is running on your computer and keep the virus info up to date Be sure anti-virus software is running on your computer and keep the virus info up to date Do not execute (open) any program (file) downloaded from the Internet without first having it scanned for viruses. Do not execute (open) any program (file) downloaded from the Internet without first having it scanned for viruses. Be cautious before allowing your Web browser to run programs behind the scenes Be cautious before allowing your Web browser to run programs behind the scenes Save all your attachments to hard disk and scan them for viruses before open them Save all your attachments to hard disk and scan them for viruses before open them Do not run any macro in Word documents or Excel spreadsheets unless you know they are reliable Do not run any macro in Word documents or Excel spreadsheets unless you know they are reliable Install and configure firewalls if your computer is connected to the Web. Install and configure firewalls if your computer is connected to the Web.

Summary – chapter 3 ROM – fast, read only and permanent ROM – fast, read only and permanent RAM – fast, allow read and write, transitory/volatile RAM – fast, allow read and write, transitory/volatile Hard disks – permanent, very high capacity, slow compared to RAM/ROM Hard disks – permanent, very high capacity, slow compared to RAM/ROM –Tracks/sectors Virtual memory Virtual memory –Allow more applications beyond the limit of RAM –Located on the hard disk Deleting vs. erasing files Deleting vs. erasing files Disk fragmentation and defragmentation Disk fragmentation and defragmentation Viruses and anti-virus programs Viruses and anti-virus programs

Terminology RAM/ROM RAM/ROM Hard disks Hard disks –Tracks and sectors Virtual memory Virtual memory Transitory/volatile RAM Transitory/volatile RAM Permanent storage Permanent storage Fragmentation Fragmentation Defragmentation Defragmentation Deleting files Deleting files Erasing files Erasing files Virus Virus Anti-virus programs Anti-virus programs