Kamis, 20 Agustus 2009

What is computer memory and how is it used?

Memory is one of the major hardware components for the computer. Is the component that temporarily stores information (such as numbers, characters, settings, instructions, files, etc) once a team has begun. The information is temporary, because when a computer is shut down or restarted, the information is deleted from memory. When a program has finished with the information, the memory is used in general (not removed) so that other programs can use the memory.

Memory is a microchip (see above) that can temporarily store Bytes. The more bytes of memory that can store more information in time. A byte is just a number with a value between 0 and 255. It is a work program to convert each byte into something human and / or other program that can interpret. For example. If memory is the storage of 4 bytes with values of 74, 79, 72 and 78 mean nothing to you. However. One of Microsoft Word 2007, the byte value of 74 J. The average value of 79 bytes O. The byte value byte and half 72 H 78 N value of Therefore, despite the ways in which memory is the storage of byte values that mean nothing to you, Microsoft Word 2007 has no problems of interpretation (reading), the same byte values as JUAN. The same applies to other programs to interpret (read) the values of bytes. For example. Paint the Agenda 74 could be interpreted as the color red, 79 yellow, 72 blue and 78 green. Considering that a language can be interpreted (read) 74 in English, 79 Spanish, 72 French and 78 Italian. Depends on the program. Either way, the memory always see 74, 79, 72 and 78. Here is a diagram of memory with 4 bytes interpreted.

The logic behind the interpretation of byte values is as follows: If the screen is 74-byte value J (in Microsoft Word 2007). If the value is 74 bytes use English (the language of the program). If the value is 74 bytes using red (Paint). And so on. In other words, the byte will always have its value of 74 but can be interpreted differently depending on the program of interpretation. Programs that save the configuration files used widely interpreted to reduce the number of bytes used. For example. If there was a drawing program to interpret red, yellow and blue with the characters using 13 Bytes (REDYELLOWBLUE). Whereas the use of the logic of byte values to represent the colors red, yellow and green that you can only use 3 bytes (79, 74 and 72).

Although these programs focus on the interpretation of byte values that are already stored in memory, the opposite is equally true. For example. When you type the word John in a Microsoft Word 2007 document their stores (puts) the byte values 74, 79, 72 and 78 within memory. Same thing with a drawing program. Instead of storing the red characters (byte values 82, 69 and 68) that can store the byte value 74 (ie, red in the example above) so that it uses 1 byte, instead of 3, each time use red ink.

Basically, the memory is so full of numbers that are interpreted by the programs in terms of instructions, settings, characters, words, sentences, numbers, symbols, etc..

Memory

When a program is first opened is assigned the memory of their own needs. For example. If you open a file from 1000 bytes to test Microsoft Word 2007 from a floppy disk, and edit (ie change the word of John Paul) did not make changes to the test file on the floppy. They are made in memory to avoid the wear of the disc. Imagine if every time you edit a test of character (a byte value), the set of test files had to be re-saved to a disk that will soon end up with a damaged disc. Simply replacing John Paul will return to save four. Memory is a constant problem for the purpose of byte values.

Microsoft Word 2007 to open a test file on diskette, for example, was assigned (reservation) 1000 bytes of memory file, which can store an exact copy of the test file into memory - the initial test file on the disc remains intact . The next step in Microsoft Word 2007 does is allocate some memory of their needs editing. For example. If you make a copy of the word JUAN, because you want to add (paste) it somewhere else in the essay, behind the scenes of Microsoft Word 2007 makes a copy of the word John By John keep the floor in the editing from memory. So now we have proof of a 1000 byte file 4 bytes of memory and memory used in publishing JUAN characters. However. Because it is possible to copy a paragraph, a test page, or even all of Microsoft Word 2007 test, to be sure it has enough memory allocated to remedy these situations. The same applies to the file in memory - not only 1000 bytes are allocated for the testing of the characters, but perhaps only 3,000 bytes in case you need to add more evidence (ie, start copying the bits of a History / Research in the test file or simply type more characters in the trial). Therefore, the test might need a total of 5000 bytes allocated for it. Once you've finished editing the test, which is on file in the memory at this point, and then to Microsoft Word 2007 to save the file in memory to disk as a new test file.

A collection of bytes is known as data. Microsoft Word 2007 sees the files and memory as a single block of data, which means that when you open a file into memory and copies everything he is doing is copying a block of data from one location (ie floppy disks ) to another (ie, memory). So when the file is saved in the memory test file to a floppy drive only sees it as a block of data copied from one place to another. And this is how you should see the files and memory - such as data blocks. Once the test file (memory) is saved to disk as a file on the memory test and edit the file memory is freed for use by other programs.

This is fine when everything is working properly, but problems arise when a program attempts to allocate memory that is not available. For example. If you try to open too many programs or files at a time that could crash (Freeze / Stop) Windows Vista. This would be due to the programs or not enough memory to open (ie, show their own windows) or not enough memory for their additional requirements, such as editing. For example. If there are only 10,000 bytes of memory and two other recently opened programs are waiting for 50000 bytes of memory each of them will be a queue. Waiting forever. Or at least until another program closes and frees memory, but may be only the liberation of 4000 bytes of memory. In which case one of the programs can be expected to use the now available 4000 bytes, and then wait for the other 46,000 bytes to become available. In addition, programs could get sick of waiting and decide to close. Either way is slow and messy. This is why we must get to know the limits of his team before the opening of many programs at once. Another scenario is the corruption of memory. It's essentially a program when it misinterprets some byte values. For example. If a language program 74 should be read in a configuration file, as English, but felt that (say) 77 instead. Is likely to display text in a different language - is not that much harm and could probably change the language settings back to English when the language program and has opened completely. However. Imagine if a program makes a byte value of 100 means that you have paid / registered to use this program and a 101 byte value that is trying the program for 30 days. You can pay £ 30 for a program that is saying they have not paid, but you're testing. By the way. This is one way hackers hack the computer ... software to modify the data (byte values), so you think you have paid for it. Apart from hacked bytes of data is often because the damaged files (software / software) came from a bad / scratched CD or floppy disk - the files can read the data (byte values), but incorrect data. Unfortunately, there is no evidence of value in each byte of a file, simply because it would be too long, especially if a large file.

BYTE TALLAS

The reason the report is that to get an idea of how data is stored and how it allocates memory. In the examples I mentioned above as it relates only to thousands of bytes (ie 4000 and 50,000) for the examples can be understood quite easily. However. The reality is that the programs and files have become larger and larger through the years
Read more >>
 
Copyright 2009 All Rights Reserved | Template Minima edit by sudarma | e-reunian