• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
Synchronous DRAM (SDRAM)
Synchronizes itself with the system’s CPU and synchronizes signal input and output on the RAM chip. It coordinates its activities with the CPU clock so the timing of the CPU and the timing of the memory activities are synchronized. This increases the speed of transmitting and executing data.
Extended data out DRAM (EDO DRAM)
This is faster than DRAM because DRAM can access only one block of data at a time, whereas this can capture the next block of data while the first block is being sent to the CPU for processing. It has a type of “look ahead” feature that speeds up memory access.
Burst EDO DRAM (BEDO DRAM)
Works like (and builds upon) EDO DRAM in that it can transmit data to the CPU as it carries out a read option, but it can send more data at once (burst). It reads and sends up to four memory addresses in a small number of clock cycles.
Double data rate SDRAM (DDR SDRAM)
Carries out read operations on the rising and falling cycles of a clock pulse. So instead of carrying out one operation per clock cycle, it carries out two and thus can deliver twice the throughput of SDRAM. Basically, it doubles the speed of memory activities, when compared
to SDRAM, with a smaller number of clock cycles.
Process isolation
Protection mechanism provided by operating systems that can be implemented as encapsulation, time multiplexing of shared resources, naming distinctions, and virtual memory mapping
Dynamic link libraries (DLLs)
A set of subroutines that are shared by different applications and operating system processes.
Base registers
Beginning of address space assigned to a process.
Used to ensure a process does not make a request outside its assigned memory boundaries.
Limit registers
Ending of address space assigned to a process. Used to
ensure a process does not make a request outside its assigned memory boundaries.
RAM
Memory sticks that are plugged into a computer’s motherboard and work as volatile memory space for an operating system.
ROM
Nonvolatile memory that is used on motherboards for BIOS functionality and various device controllers to allow for operating system-to-device communication. Sometimes used for off-loading graphic rendering or cryptographic functionality.
Hardware segmentation
Physically mapping software to individual memory segments.
Cache memory
Fast and expensive memory type that is used by a
CPU to increase read and write operations.
Absolute addresses
Hardware addresses used by the CPU.
Logical addresses
Indirect addressing used by processes within an
operating system.
Stack
Memory construct that is made up of individually addressable buffers. Process-to-process communication takes place through the use of these.
buffer overflow
Too much data is put into the buffers that make up a
stack. Common attack vector used by hackers to run malicious code on a target system
Address space layout randomization (ASLR)
Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an
attacker to exploit specific memory vulnerabilities.
Data execution prevention (DEP)
Memory protection mechanism used by some operating systems. Memory segments may be marked as nonexecutable so that they cannot be misused by malicious software
Garbage collector
Tool that marks unused memory segments as usable to ensure that an operating system does not run out of memory
Virtual memory
Combination of main memory (RAM) and secondary
memory within an operating system.
Programmable read-only memory (PROM)
form of ROM that can be modified after it has been manufactured. can be programmed only one time because the voltage that is used to write bits into the memory cells actually burns out the fuses that
connect the individual memory cells.
Erasable programmable read-only memory (EPROM)
can be erased, modified, and upgraded. holds data that can be electrically erased or written to. To erase the data on the memory chip, you need an ultraviolet (UV) light device
electrically erasable programmable read-only memory (EEPROM)
its data storage can be erased and modified electrically
by onboard programming circuitry and signals. This activity erases only one byte at a time, which is slow.
Flash memory
special type of memory that is used in digital cameras, BIOS chips, memory cards, and video game consoles. It is a solid-state technology, meaning it does not have moving parts and is used more as a type of hard drive than memory.
relative addresses
based on a known address with an offset value applied.