Lesson 06: Understanding Computer Memory Types

Lesson 21/101 | Study Time: 30 Min
Lesson 06: Understanding Computer Memory Types

Learning Outcomes



Upon successful completion of this lesson, students will be able to:



i. Define and differentiate between ROM, PROM, EPROM, and EEPROM, understanding their respective characteristics and storage mechanisms.



ii. Explain the concept of read-only memory (ROM), a non-volatile memory that can only be read and not modified, and its applications in storing essential firmware and BIOS instructions.



iii. Grasp the principle of programmable read-only memory (PROM), a type of ROM that can be programmed once using a special device, and its use in embedding instructions into microcontrollers.



iv. Recognize the role of erasable programmable read-only memory (EPROM), a type of ROM that can be erased using ultraviolet light and reprogrammed, and its applications in firmware updates and embedded systems.



v. Appreciate the advantages of electrically erasable programmable read-only memory (EEPROM), a type of ROM that can be erased and reprogrammed electrically, enabling flexible data storage and modification.



vi. Evaluate the suitability of ROM, PROM, EPROM, and EEPROM for different data storage needs, considering their unique characteristics and limitations.



 



Introduction



In the realm of computing, memory plays a pivotal role in enabling the storage and retrieval of information, essential for the operation of computers and the execution of various tasks. While random-access memory (RAM) provides temporary storage for data and programs during operation, other types of memory, such as read-only memory (ROM), PROM, EPROM, and EEPROM, offer persistent data storage solutions. This lesson delves into the world of these memory types, guiding students through their distinct characteristics, applications, and suitability for different data storage requirements.



 



i. Read-Only Memory (ROM): The Guardian of Essential Instructions



Read-only memory (ROM) is a non-volatile memory that can only be read and not modified. Its contents are embedded during manufacturing and remain permanent even when power is lost. ROM is typically used to store essential firmware and BIOS instructions, providing the critical startup information needed for computers to operate correctly.



Applications of ROM:



Firmware Storage: ROM stores firmware, the low-level software that controls the basic functions of devices, such as printers, routers, and microcontrollers.



BIOS Storage: ROM contains the BIOS (Basic Input/Output System), a set of instructions that initialize the hardware and prepare the computer for the operating system to load.



 



ii. Programmable Read-Only Memory (PROM): A One-Time Writable Memory



Programmable read-only memory (PROM) is a type of ROM that can be programmed once using a special device called a PROM programmer. Once programmed, PROM becomes like traditional ROM, retaining its contents even without power. PROM is often used in embedded systems where instructions need to be permanently stored.



Applications of PROM:



Microcontroller Programming: PROM is used to embed instructions into microcontrollers, providing the necessary control logic for various embedded devices.



Configuration Settings: PROM can store configuration settings for hardware devices, ensuring consistent operation upon power cycles.



 



iii. Erasable Programmable Read-Only Memory (EPROM): Rewriting the Past



Erasable programmable read-only memory (EPROM) is a type of ROM that can be erased using ultraviolet light and reprogrammed multiple times. This allows for flexibility in updating firmware and software in embedded systems without requiring the replacement of memory chips.



Applications of EPROM:



Firmware Updates: EPROM is used to store firmware that can be updated or modified without replacing the entire memory chip.



Embedded Systems Development: EPROM facilitates rapid prototyping and testing of embedded systems by allowing for easy reprogramming.



Electrically Erasable Programmable Read-Only Memory (EEPROM): Erasing and Rewriting with Electricity



Electrically erasable programmable read-only memory (EEPROM) is a type of ROM that can be erased and reprogrammed electrically. This eliminates the need for ultraviolet light and enables in-circuit programmability, making it a versatile and widely used memory type.



 



iv. Applications of EEPROM:



Configuration Data Storage: EEPROM is used to store configuration data for various devices, such as smartphones and network routers, allowing for user customization and updates.



Data Logging: EEPROM is employed in data logging applications to store sensor readings or other critical data that needs to be preserved even in power outages.



 



ROM, PROM, EPROM, and EEPROM represent a spectrum of non-volatile memory technologies, each with its own unique characteristics and applications. ROM provides permanent storage for essential instructions, PROM allows for one-time programming, EPROM offers erasability and reprogrammability using ultraviolet light, and EEPROM enables electrical erasing and reprogramming, making it the most flexible and widely used type of non-volatile memory. Understanding the distinctions between these memory



 

Saboor Ali

Saboor Ali

Product Designer

Class Sessions

1- Lesson 01: Identifying Computing Devices 2- Lesson 02: Defining Computers and Their Operations 3- Lesson 03: Classifying Computers: Microcomputers, Mainframes, Supercomputers, and Mobile Computing 4- Lesson 04: Distinguishing Hardware and Software: Understanding Their Roles 5- Lesson 05: Exploring the World of Software: System Software and Application Software 6- Lesson 06: Unveiling the Types of System Software: Operating Systems, Device Drivers, Utility Software, and Language Processors 7- Lesson 07: Exploring the Realm of Application Software: Productivity Software, Business Software, Entertainment Software, and Education Software 8- Lesson 08: From Data to Information: Understanding Data Processing and Its Importance 9- Lesson 09: Navigating the Software Landscape: Licensed Software, Open Source Software, Shareware, and Freeware 10- Lesson 10: Firmware: The Invisible Force Behind Devices 11- Lesson 11: Demystifying Computer Hardware: Input, Processing, and Output 12- Lesson 12: The Gateways to Interaction: Exploring Input Devices 13- Lesson 13: Unveiling the World of Scanners: Digitizing Information with Handheld, Flatbed, and Optical Scanners 14- Lesson 14: Displaying Information with Monitors: CRTs, LCDs, and Beyond 15- Lesson 15: From Digital to Print: Exploring Printers and Plotters 16- Lesson 01: Unveiling the Building Blocks of Memory: Bits, Bytes, and Memory Words 17- Lesson 02: Chip Memory vs. Magnetic Memory: Exploring Storage Technologies 18- Lesson 03: Volatile Memory vs. Non-volatile Memory: Understanding Data Persistence 19- Lesson 04: The Brain's Fast Track: Internal Processor Memory – Cache and Registers 20- Lesson 05: RAM: The Dynamic Duo of Memory – Static RAM and Dynamic RAM 21- Lesson 06: Understanding Computer Memory Types 22- Lesson 07: Exploring Secondary Storage Devices 23- Lesson 08: Sequential Access vs. Direct Access 24- Lesson 09: Magnetic and Optical Memory Technologies 25- Lesson 10: Exploring Chip Memories - Flash Memory & Memory Cards 26- Lesson 01: Understanding CPU Components 27- Lesson 02: Exploring General Purpose Registers 28- Lesson 03: Understanding Special Purpose Registers 29- Lesson 04: System Bus and Its Types 30- Lesson 05: Defining Instructions and Types 31- Lesson 06: Explaining Instruction Format 32- Lesson 07: Describing the Instruction Cycle 33- Lesson 08: Understanding CISC and RISC Architectures 34- Lesson 09: Differentiating Processors Based on Technical Specifications 35- Lesson 10: Differentiating Processors Based on Architecture 36- Lesson 01: Differentiating CPU and System Unit 37- Lesson 02: Identifying Computer Casing and Types 38- Lesson 04: Describing Different Ports 39- Lesson 05: Identifying Expansion Cards - Part 1 40- Lesson 06: Identifying Expansion Cards - Part 2 41- Lesson 01: Understanding Basic Network Components 42- Lesson 02: Exploring Modes of Communication 43- Lesson 03: Understanding Communication Media 44- Lesson 04: Introducing Communication Devices 45- Lesson 05: Explaining Network Architecture 46- Lesson 06: Understanding Network Types 47- Lesson 07: Exploring Network Topologies 48- Lesson 08: Understanding Communication Standards 49- Lesson 09: Introducing OSI Model and Layered Concept 50- Lesson 10: Examples of Protocols and Devices in OSI Layers 51- Lesson 11: Exploring TCP/IP Protocol for Internet Communication 52- Lesson 12: Comparing TCP/IP with OSI Model 53- Lesson 13: Distinguishing Circuit Switching and Packet Switching 54- Lesson 14: Understanding IP Addressing Scheme 55- Lesson 01: Introduction to Wireless Networks 56- Lesson 02: Understanding Advantages and Disadvantages of Wireless Networks 57- Lesson 03: Defining Key Terms in Wireless Communication 58- Lesson 04: Short Distance vs. Long Distance Wireless Communications 59- Lesson 05: Exploring Short Distance Wireless Technologies 60- Lesson 06: Understanding Long Distance Wireless Communications 61- Lesson 07: Requirements of Mobile Communication 62- Lesson 08: Features and Limitations of Mobile Communication Systems 63- Lesson 09: Explaining Communication Architecture for Mobile Devices 64- Lesson 01: Understanding Data and Information 65- Lesson 02: Exploring File Management Systems 66- Lesson 03: Defining Database 67- Lesson 04: Explaining Database Management Systems (DBMS) 68- Lesson 05: Advantages of DBMS over File Management Systems 69- Lesson 06: Role of a Database Administrator (DBA) 70- Lesson 07: Exploring Database Models 71- Lesson 08: Database Languages for Relational Databases 72- Lesson 09: Terms in Relational Databases 73- Lesson 10: Steps for Designing a Database 74- Lesson 11: Visualizing Database Elements 75- Lesson 12: Cardinalities and Modalities in Databases 76- Lesson 13: Drawing Entity-Relationship (ER) Diagrams 77- Lesson 14: Normalization of Relations 78- Lesson 01: Introduction to Relational Database Management Systems (RDBMS) 79- Lesson 02: Selecting a Database Management System (DBMS) 80- Lesson 03: Creating and Saving a Database 81- Lesson 04: Exploring the Database Environment 82- Lesson 05: Managing Tables in Different Ways 83- Lesson 06: Understanding Data Types 84- Lesson 07: Creating and Editing Relationships 85- Lesson 08: Key Constraints for Data Integrity 86- Lesson 09: Creating and Editing Table Relationships 87- Lesson 10: Record Navigation in Tables 88- Lesson 11: Record Management in Tables 89- Lesson 12: Creating and Editing Forms 90- Lesson 13: Exploring Form Views 91- Lesson 14: Record Navigation in Forms 92- Lesson 15: Record Management in Forms 93- Lesson 16: Utilizing Form Controls 94- Lesson 17: Creating, Saving, and Editing Queries 95- Lesson 18: Implementing Different Types of Queries 96- Lesson 19: Generating Reports Using Report Wizard 97- Lesson 20: Utilizing Various Report Layouts/Styles 98- Lesson 21: Setting Sort Order for Reports 99- Lesson 22: Customizing Reports Using Queries and Expressions 100- Lesson 23: Saving, Viewing, and Printing Reports 101- Lesson 16: Soft Copy vs. Hard Copy: Distinguishing between Digital and Physical Representations of Data