It also offers a RAM backed file system that will disappear on loss of power. NOT APPLICABLE. Memory Information and Procedures

Size: px
Start display at page:

Download "It also offers a RAM backed file system that will disappear on loss of power. NOT APPLICABLE. Memory Information and Procedures"

Transcription

1 Agilent Technologies, Inc Stevens Creek Blvd. Santa Clara, CA telephone alternate facsimile Memory Information and Procedures Product: 34972A Data Acquisition Control Mainframe and Modules (34901A, 34902A, 34903A, 34904A, 34905A, 34906A, and 34907A) Date: January 17, 2013 Volatile Memory Memory Type: Processor SDRAM Memory Memory Size: 128MByte Memory Function: Main dynamic RAM memory for processor. Contains working copies of Operating System, Instrument software, and measurement data. It also offers a RAM backed file system that will disappear on loss of power. Volatile (Y/N): Yes Turn off instrument power. NOT APPLICABLE Does this process: Sanitize memory Clear memory Erases memory (best effort) Process to physically remove memory: Processor PCB Assy Contains user data. This memory is not battery backed or connected to standby power. Non-Volatile Memory Memory Type: Parallel NAND Flash Memory Memory Size: 128MByte Memory Function: Contains Microsoft Windows CE Embedded Operating System, Instrument Firmware, Crash recovery image, connectivity data, serial number, and user instrument states. This also serves as the boot flash so here is no separate BIOS memory chip on the board. Volatile (Y/N): No SCPI command SYSTem:SECurity:IMMediate is used to sanitize(i) the user portion of this memory. The Model number, Serial Number, and the Instrument firmware are retained. The connectivity data and

2 user instrument state are sanitized. After reboot the connectivity data will be restored to the factory defaults. Following is a description of the process performed by the EraseFlash() method: This method performs a block-by-block erase as per chip manufacturer s data sheets. (Note, splash screen, fixed FPGA data, OS images, model number and serial numbers are not erased. These contain no user data and are not user accessible.) ** 1. Open the storage volume using OpenStore. ** 2. Dismount the first file system, store name Agilent Flash, using DismountStore. ** 3. Erase flash file system and selected sections of secure storage. This is done block by block. On the P500 system, there is a second file system that will not be erased. It will contain no user data but firmware binaries for easy update rather than distributing a whole new nk.bin image. ** 4. Format the store, using FormatStore. ** 5. Create the desired number of partitions on the store, using CreatePartition. ** 6. If the AutoFormat registry value is not set, format the partition using FormatPartition. For more information on the Storage Manager registry settings, see Storage Manager Registry Settings. The operations/functions referenced above are utilized from the Windows Embedded CE Storage Manager: Does this process: X Sanitize memory Clear memory Erases memory (best effort) Process to physically remove memory: Memory chips are soldered to PCA. Memory Type: Serial SPI Flash Memory Memory Size: 4MByte Memory Function: The 4MByte serial flash memory part is connected to the SH600 s SMI port. This memory includes the bootloader components (Xloader, U-boot, and P-boot) that configure the SH600 at boot time and load the operating firmware from the NAND flash memory. User Modifiable (Y/N): No Volatile (Y/N): No This part does not contain user data. NOT APPLICABLE since device is one-time preprogrammed during manufacturing or service

3 Does this process: X Sanitize memory Clear memory Erases memory (best effort) Process to physically remove memory: Memory chips are soldered to PCA. Memory Type: Battery-backed SRAM Memory Size: 4 128K x 8 and 1 32 x 8 Memory Function: Store instrument readings and instrument state Volatile (Y/N): Yes Not cleared when power is turned off. Instrument readings are overwritten by measuring some insignificant value (e.g. zero) at high reading rate. It takes approximately 8 seconds to clear the memory. Erase saved states with MEMory:STATe:DELete <0-5>. Circuit Designator: SPD The memory is written over with new data. Agilent P/N: 34970A Use the MEMory:STATe:VALid? query to determine if saved states are valid. Does this process: Sanitize memory XClear memory Erases memory (best effort) Process to physically remove memory: Processor PCB Assy Contains user data. Repeat the two tables above for each memory type. Select one of the following: Sanitization process is documented above Sanitization process could be available with engineering resources Sanitization process is not possible (i.e. sanitize the product by destruction

4 Clearing and Sanitization Matrix Media Clear Sanitize Magnetic Tape Type I a b m Type II a b m Type III a b m Magnetic Disk Bernoullis a c b m Floppy a c b m Non-Removable Rigid Disk c a d m Removable Rigid Disk a c a d m Optical Disk Read Many, Write Many c m Read Only m n Write Once, Read Many (Worm) m n Memory Dynamic Random Access Memory (DRAM) c h c h m Electronically Alterable PROM (EAPROM) i j m Electronically Erasable PROM (EEPROM) i g m Erasable Programmable ROM (EPROM) k c l m l then c Flash EPROM (FEPROM) i c i m c then i Programmable ROM (PROM) c m Magnetic Bubble Memory c a c m Magnetic Core Memory c a e m Magnetic Plated Wire c c f m c and f Magnetic Resistive Memory c m NonVolatile RAM (NOVRAM) c h c h m Read Only Memory (ROM) Synchronous DRAM (SDRAM) c h c h m Static Random Access Memory (SRAM) c h c f h m c and f Equipment Monitor h q Impact Printer h h p p then h Laser Printer h h o o then h m

5 a. Degauss with Type I, II, or III degausser. b. Degauss with same Type (I, II, or III) degausser. c. Overwrite all addressable locations with a single character. d. THIS METHOD NOT APPROVED FOR SANITIZING MEDIA THAT CONTAINS TOP SECRET INFORMATION. 1. Before any sanitization product is acquired, careful analysis to the overall costs associated with overwrite/sanitization should be made. Depending on the contractor s environment, the size of the drive and the differences in the individual products time to perform the sanitization, destruction of the media might be the preferred (i.e., economical) sanitization method. 2. Overwrite all addressable locations with a character, then its complement. Verify complement character was written successfully to all addressable locations, then overwrite all addressable locations with random characters; or verify third overwrite of random characters. Overwrite utility must write/read to growth defect list/sectors or disk must be mapped before initial classified use and remapped before sanitization. Difference in the comparison lists must be discussed with the DSS Industrial Security Representative (IS Rep) and/or Information System Security Professional (ISSP) before declassification. Note: Overwrite utilities must be authorized by DSS before use. e. Overwrite all addressable locations with a character, its complement, then a random character. f. Each overwrite must resident in memory for a period longer than the classified data resided. g. Overwrite all locations with a random pattern, then with binary zeros, and finally with binary ones. h. Remove all power to include battery power. i. Perform a full chip erase as per manufacturer s data sheets. j. Perform i above, then c above, a total of three times. k. Perform an ultraviolet erase according to manufacturer s recommendation. l. Perform k above, but increase time by a factor of three. m. Destruction see 1.) and 2.) below. n. Destruction required only if classified information is contained. o. Run 1 page (font test acceptable) when print cycle not completed (e.g. paper jam or power failure). Dispose of output as unclassified if visual examination does not reveal any classified information. p. Ribbons must be destroyed. Platens must be cleaned. q. Inspect and/or test screen surface for evidence of burn-in information. If present, screen must be destroyed. 1.) All methods of destruction must be authorized by DSS before use. Types of destruction are Disintegrate, incinerate, pulverize, or melt. NOTE: As of 22 April, 2002 shredding of IA products is not authorized.

NTFS File System and Data Security. Yanhui Tu. KingSoft

NTFS File System and Data Security. Yanhui Tu. KingSoft NTFS File System and Data Security Yanhui Tu KingSoft Index 1 File System kernel analysis 2 Stream and Data security 3 Data recover 4 Date overwrite File There are 2 different kinds Metafiles: user can

More information

Security Features and Volatility Documentation

Security Features and Volatility Documentation Security Features and Volatility Documentation Keysight Technologies, Inc. Model Numbers: 34460A 34461A 34465A 34470A Product Family: Truevolt Series of Digital Multimeters 5991-1950EN Revision 2.0 January,

More information

GDisk disk-wipe specifications

GDisk disk-wipe specifications GDisk disk-wipe specifications This document includes the following topics: About this document About GDisk disk-wipe specifications GDisk conformance to standards Clearing, sanitizing, and viewing hard

More information

NSA/CSS STORAGE DEVICE DECLASSIFICATION MANUAL (This Manual 9 12 supersedes NSA/CSS Manual 130 2, dated 10 November 2000.

NSA/CSS STORAGE DEVICE DECLASSIFICATION MANUAL (This Manual 9 12 supersedes NSA/CSS Manual 130 2, dated 10 November 2000. NSA/CSS STORAGE DEVICE DECLASSIFICATION MANUAL (This Manual 9 12 supersedes NSA/CSS Manual 130 2, dated 10 November 2000.) PROCEDURES 1. Guidance for the sanitization, declassification, and release of

More information

*P *

*P * TBS1000, TBS1000B/TBS1000B-EDU, TDS1000B/TDS2000B, TDS1000C-EDU/TDS2000C, and TPS2000B Series Digital Storage Oscilloscope Declassification and Security Instructions *P077077102* 077-0771-02 TBS1000,

More information

Memory Overview. Overview - Memory Types 2/17/16. Curtis Nelson Walla Walla University

Memory Overview. Overview - Memory Types 2/17/16. Curtis Nelson Walla Walla University Memory Overview Curtis Nelson Walla Walla University Overview - Memory Types n n n Magnetic tape (used primarily for long term archive) Magnetic disk n Hard disk (File, Directory, Folder) n Floppy disks

More information

Security Features and Volatility Documentation

Security Features and Volatility Documentation Security Features and Volatility Documentation Agilent Technologies, Inc. 8753E, 8753ET/ES and 08753-90121 Revision Date: March 28, 2012 Print Date: March 29, 2012 Copyright 2012 Agilent Technologies Inc.

More information

R&S NRP2 Power Meter Instrument Security Procedures

R&S NRP2 Power Meter Instrument Security Procedures Power Meter Instrument Security Procedures (;ÚÝP2) 1176.7932.02 02 Instrument Security Procedures Contents Contents 1 Overview... 2 2 Instrument Models Covered...2 3 Security Terms and Definitions... 2

More information

Introduction read-only memory random access memory

Introduction read-only memory random access memory Memory Interface Introduction Simple or complex, every microprocessorbased system has a memory system. Almost all systems contain two main types of memory: read-only memory (ROM) and random access memory

More information

Keysight N5191A/93A UXG X-Series Agile Signal Generator

Keysight N5191A/93A UXG X-Series Agile Signal Generator Keysight N5191A/93A UXG X-Series Agile Signal Generator Security Features and Document of Volatility Notices Copyright Notice Keysight Technologies 2014-2019 No part of this manual may be reproduced in

More information

Input output and memory devices

Input output and memory devices Input output and memory devices One marks 1. What is cache memory The very high speed memory present between CPU and RAM 2. Expand the term OCR Optical Character Recognition (Recognizer) 3. Expand the

More information

PQA500 Picture Quality Analyzer Declassification and Security Instructions

PQA500 Picture Quality Analyzer Declassification and Security Instructions PQA500 Picture Quality Analyzer Declassification and Security Instructions www.tektronix.com 071-2266-00 Copyright Tektronix. All rights reserved. Licensed software products are owned by Tektronix or its

More information

Memory classification:- Topics covered:- types,organization and working

Memory classification:- Topics covered:- types,organization and working Memory classification:- Topics covered:- types,organization and working 1 Contents What is Memory? Cache Memory PC Memory Organisation Types 2 Memory what is it? Usually we consider this to be RAM, ROM

More information

ESA-Series Spectrum Analyzers EMC Analyzers NFA Series Noise Figure Analyzers. Security Features

ESA-Series Spectrum Analyzers EMC Analyzers NFA Series Noise Figure Analyzers. Security Features ESA-Series Spectrum Analyzers EMC Analyzers NFA Series Noise Figure Analyzers Security Features Part Number: E4401-90513 Supersedes: E4401-90494 Printed in USA October 2018 Copyright 2005-2018 Keysight

More information

Memory Study Material

Memory Study Material Computer memory refers to the devices that are used to store data or programs on a temporary or permanent basis for use in a computer. Any data or instruction entered into the memory of a computer is considered

More information

R&S NRP USB and LAN Power Sensors Instrument Security Procedures

R&S NRP USB and LAN Power Sensors Instrument Security Procedures USB and LAN Power Sensors Instrument Security Procedures (;ÛÁ42) 1177.5104.02 02 Instrument Security Procedures Contents Contents 1 Overview... 2 2 Instrument Models Covered...2 3 Security Terms and Definitions...

More information

Allmost all systems contain two main types of memory :

Allmost all systems contain two main types of memory : Memory Interface Allmost all systems contain two main types of memory : read-only memory (ROM) system software and permanent system data random access memory (RAM) or read/write memory application software

More information

*XLGHOLQHV IRU 0HGLD 6DQLWL]DWLRQ )URP WKH 1DWLRQDO,QVWLWXWH RI 6WDQGDUGV DQG 7HFKQRORJ\ V 11, HY 1 of 18

*XLGHOLQHV IRU 0HGLD 6DQLWL]DWLRQ )URP WKH 1DWLRQDO,QVWLWXWH RI 6WDQGDUGV DQG 7HFKQRORJ\ V 11, HY 1 of 18 1 of 18 Table of Contents Minimum Sanitization Recommendations... 4-5 Networking Devices (Routers & Switches)... 6 Mobile Devices... 6-8 Apple iphone and ipad... 6 Blackberry... 6 Devices Running Google

More information

Q1. Describe C.P.U and its subunits with the help of diagram?

Q1. Describe C.P.U and its subunits with the help of diagram? Q1. Describe C.P.U and its subunits with the help of diagram? Ans. C.P.U (CENTRAL PROCESSING UNIT) Book page # 27 The C.P.U is the brain of computer.it controls and supervises all the units. Processing

More information

Computer Organization. 8th Edition. Chapter 5 Internal Memory

Computer Organization. 8th Edition. Chapter 5 Internal Memory William Stallings Computer Organization and Architecture 8th Edition Chapter 5 Internal Memory Semiconductor Memory Types Memory Type Category Erasure Write Mechanism Volatility Random-access memory (RAM)

More information

Chapter 4 Main Memory

Chapter 4 Main Memory Chapter 4 Main Memory Course Outcome (CO) - CO2 Describe the architecture and organization of computer systems Program Outcome (PO) PO1 Apply knowledge of mathematics, science and engineering fundamentals

More information

Model Number(s): DSO5xxxA/DSO/MSO6xxxA. **Declassification of the 5000A/6000A Series Oscilloscope**

Model Number(s): DSO5xxxA/DSO/MSO6xxxA. **Declassification of the 5000A/6000A Series Oscilloscope** **Declassification of the 5000A/6000A Series Oscilloscope** 54695-92006 Printed in USA November 2006 Agilent Technologies, Inc. 2006 1 Product Declassification and Security (Requires the N5427A Secure

More information

MEMORY. Computer memory refers to the hardware device that are used to store and access data or programs on a temporary or permanent basis.

MEMORY. Computer memory refers to the hardware device that are used to store and access data or programs on a temporary or permanent basis. MEMORY Computer memory refers to the hardware device that are used to store and access data or programs on a temporary or permanent basis. There are TWO TYPE of nature of memory in a computer. Temporary/

More information

R&S SMB100A RF and Microwave Signal Generator Instrument Security Procedures

R&S SMB100A RF and Microwave Signal Generator Instrument Security Procedures RF and Microwave Signal Generator Instrument Security Procedures (;ÚèY2) 1176.9041.02 03 Instrument Security Procedures Contents Contents 1 Overview... 2 2 Instrument Models Covered...2 3 Security Terms

More information

Xerox Iridesse Press Statement of Volatility. Month 00, 0000 <Part Number>

Xerox Iridesse Press Statement of Volatility. Month 00, 0000 <Part Number> Xerox Iridesse Press Statement of Volatility Month 00, 0000 2018 Xerox Corporation. All rights reserved. Xerox and Xerox and Design, Iridesse, and SquareFold are trademarks of Xerox Corporation

More information

Organization. 5.1 Semiconductor Main Memory. William Stallings Computer Organization and Architecture 6th Edition

Organization. 5.1 Semiconductor Main Memory. William Stallings Computer Organization and Architecture 6th Edition William Stallings Computer Organization and Architecture 6th Edition Chapter 5 Internal Memory 5.1 Semiconductor Main Memory 5.2 Error Correction 5.3 Advanced DRAM Organization 5.1 Semiconductor Main Memory

More information

Microcontroller Systems. ELET 3232 Topic 11: General Memory Interfacing

Microcontroller Systems. ELET 3232 Topic 11: General Memory Interfacing Microcontroller Systems ELET 3232 Topic 11: General Memory Interfacing 1 Objectives To become familiar with the concepts of memory expansion and the data and address bus To design embedded systems circuits

More information

William Stallings Computer Organization and Architecture 6th Edition. Chapter 5 Internal Memory

William Stallings Computer Organization and Architecture 6th Edition. Chapter 5 Internal Memory William Stallings Computer Organization and Architecture 6th Edition Chapter 5 Internal Memory Semiconductor Memory Types Semiconductor Memory RAM Misnamed as all semiconductor memory is random access

More information

Xerox Versant 3100 Press Xerox FreeFlow Print Server. Statement of Volatility Version 1.0

Xerox Versant 3100 Press Xerox FreeFlow Print Server. Statement of Volatility Version 1.0 Xerox Versant 3100 Press Xerox FreeFlow Print Server Statement of Volatility Version 1.0 Xerox Versant 3100 Press FreeFlow Print Server Statement of Volatility 2017 Xerox Corporation. All rights reserved.

More information

PSA-Series Spectrum Analyzers

PSA-Series Spectrum Analyzers This manual provides documentation for the following analyzers: E4440A E4443A E4445A E4446A E4447A E4448A Security Features and Document of Volatility Table of Contents Contacting Agilent Sales and Service

More information

4287A Security Features Rev. 1.0

4287A Security Features Rev. 1.0 4287A Security Features Rev. 1.0 04287-90802 February 2008 Copyright 2008 Agilent Technologies Page 1 of 7 Contacting Agilent Sales and Service Offices Assistance with test and measurements needs and information

More information

R&S SGS100A SGMA RF Source Instrument Security Procedures

R&S SGS100A SGMA RF Source Instrument Security Procedures SGMA RF Source Instrument Security Procedures (;ÙÍP2) 1175.6332.02 04 Instrument Security Procedures Contents Contents 1 Overview... 2 2 Instrument Models Covered...2 3 Security Terms and Definitions...

More information

R&S SMBV100A Vector Signal Generator Instrument Security Procedures

R&S SMBV100A Vector Signal Generator Instrument Security Procedures Vector Signal Generator Instrument Security Procedures (;ÚèÔ2) 1176.9070.02 02 Instrument Security Procedures Contents Contents 1 Overview... 2 2 Instrument Models Covered...2 3 Security Terms and Definitions...

More information

Battery Backup. Sanitization Procedure Waveform Data SDRAM 32 MB (-01/-21) No Yes Yes Cycle Power

Battery Backup. Sanitization Procedure Waveform Data SDRAM 32 MB (-01/-21) No Yes Yes Cycle Power Manufacturer: National Instruments Board Assembly Part Numbers ( DIGITIZERS) Part Number and Revision Description 185701C-01 to 185701H-01 IF DIGITIZER, 16MS 185701F-21 IF DIGITIZER, 16MS 185701C-02 to

More information

UNIT-V MEMORY ORGANIZATION

UNIT-V MEMORY ORGANIZATION UNIT-V MEMORY ORGANIZATION 1 The main memory of a computer is semiconductor memory.the main memory unit is basically consists of two kinds of memory: RAM (RWM):Random access memory; which is volatile in

More information

Internal Memory. Computer Architecture. Outline. Memory Hierarchy. Semiconductor Memory Types. Copyright 2000 N. AYDIN. All rights reserved.

Internal Memory. Computer Architecture. Outline. Memory Hierarchy. Semiconductor Memory Types. Copyright 2000 N. AYDIN. All rights reserved. Computer Architecture Prof. Dr. Nizamettin AYDIN naydin@yildiz.edu.tr nizamettinaydin@gmail.com Internal Memory http://www.yildiz.edu.tr/~naydin 1 2 Outline Semiconductor main memory Random Access Memory

More information

RSA5100A Series Real-Time Signal Analyzers Declassification and Security Instructions

RSA5100A Series Real-Time Signal Analyzers Declassification and Security Instructions xx ZZZ RSA5100A Series Real-Time Signal Analyzers Declassification and Security Instructions www.tektronix.com *P077052100* 077-0521-00 Copyright Tektronix. All rights reserved. Licensed software products

More information

Semiconductor Memories: RAMs and ROMs

Semiconductor Memories: RAMs and ROMs Semiconductor Memories: RAMs and ROMs Lesson Objectives: In this lesson you will be introduced to: Different memory devices like, RAM, ROM, PROM, EPROM, EEPROM, etc. Different terms like: read, write,

More information

Xerox Brenva HD Production Inkjet Press Xerox FreeFlow Print Server Statement of Volatility

Xerox Brenva HD Production Inkjet Press Xerox FreeFlow Print Server Statement of Volatility Xerox Brenva HD Production Inkjet Press Xerox FreeFlow Print Server Statement of Volatility September 2017 Notice This document describes the locations, capacities, and contents of volatile and non-volatile

More information

Concept of Memory. The memory of computer is broadly categories into two categories:

Concept of Memory. The memory of computer is broadly categories into two categories: Concept of Memory We have already mentioned that digital computer works on stored programmed concept introduced by Von Neumann. We use memory to store the information, which includes both program and data.

More information

Semiconductor Memory Types Microprocessor Design & Organisation HCA2102

Semiconductor Memory Types Microprocessor Design & Organisation HCA2102 Semiconductor Memory Types Microprocessor Design & Organisation HCA2102 Internal & External Memory Semiconductor Memory RAM Misnamed as all semiconductor memory is random access Read/Write Volatile Temporary

More information

STATE OF NEW JERSEY IT CIRCULAR

STATE OF NEW JERSEY IT CIRCULAR NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 Riverview Plaza Adel Ebeid, Chief Technology Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR

More information

Statement of Volatility Xerox EX-P 1000i Print Server, Powered by Fiery for the Xerox Color 800i/1000i Press

Statement of Volatility Xerox EX-P 1000i Print Server, Powered by Fiery for the Xerox Color 800i/1000i Press Powered by Fiery for the Xerox Color 800i/1000i Press Notice This document describes the locations, capacities and contents of volatile and non-volatile memory devices within the Xerox EX-P 1000i Print

More information

Module 5a: Introduction To Memory System (MAIN MEMORY)

Module 5a: Introduction To Memory System (MAIN MEMORY) Module 5a: Introduction To Memory System (MAIN MEMORY) R E F E R E N C E S : S T A L L I N G S, C O M P U T E R O R G A N I Z A T I O N A N D A R C H I T E C T U R E M O R R I S M A N O, C O M P U T E

More information

Advanced Parallel Architecture Lesson 4 bis. Annalisa Massini /2015

Advanced Parallel Architecture Lesson 4 bis. Annalisa Massini /2015 Advanced Parallel Architecture Lesson 4 bis Annalisa Massini - 2014/2015 Internal Memory RAM Many memory types are random access individual words of memory are directly accessed through wired-in addressing

More information

An Overview of the Computer System. Kafui A. Prebbie 24

An Overview of the Computer System. Kafui A. Prebbie 24 An Overview of the Computer System Kafui A. Prebbie -kafui@kafui.com 24 The Parts of a Computer System What is a Computer? Hardware Software Data Users Kafui A. Prebbie -kafui@kafui.com 25 The Parts of

More information

Sanitization Procedure Waveform storage DRAM 2 GB No Yes Yes Cycle Power Device operation FPGA / Processor Xilinx XC7Z100 (-01/-03) XC7Z035 (-02)

Sanitization Procedure Waveform storage DRAM 2 GB No Yes Yes Cycle Power Device operation FPGA / Processor Xilinx XC7Z100 (-01/-03) XC7Z035 (-02) Manufacturer: National Instruments Board Assembly Part Numbers (Refer to Procedure 1 for identification procedure): Part Number and Revision Description 141064A-01L or later USRP N310 141064A-03L or later

More information

UMBC. Select. Read. Write. Output/Input-output connection. 1 (Feb. 25, 2002) Four commonly used memories: Address connection ... Dynamic RAM (DRAM)

UMBC. Select. Read. Write. Output/Input-output connection. 1 (Feb. 25, 2002) Four commonly used memories: Address connection ... Dynamic RAM (DRAM) Memory Types Two basic types: ROM: Read-only memory RAM: Read-Write memory Four commonly used memories: ROM Flash (EEPROM) Static RAM (SRAM) Dynamic RAM (DRAM) Generic pin configuration: Address connection

More information

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng.

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng. CS 265 Computer Architecture Wei Lu, Ph.D., P.Eng. Part 4: Memory Organization Our goal: understand the basic types of memory in computer understand memory hierarchy and the general process to access memory

More information

BCN1043. By Dr. Mritha Ramalingam. Faculty of Computer Systems & Software Engineering

BCN1043. By Dr. Mritha Ramalingam. Faculty of Computer Systems & Software Engineering BCN1043 By Dr. Mritha Ramalingam Faculty of Computer Systems & Software Engineering mritha@ump.edu.my http://ocw.ump.edu.my/ authors Dr. Mohd Nizam Mohmad Kahar (mnizam@ump.edu.my) Jamaludin Sallim (jamal@ump.edu.my)

More information

Lecture-7 Characteristics of Memory: In the broad sense, a microcomputer memory system can be logically divided into three groups: 1) Processor

Lecture-7 Characteristics of Memory: In the broad sense, a microcomputer memory system can be logically divided into three groups: 1) Processor Lecture-7 Characteristics of Memory: In the broad sense, a microcomputer memory system can be logically divided into three groups: 1) Processor memory 2) Primary or main memory 3) Secondary memory Processor

More information

UNIT:4 MEMORY ORGANIZATION

UNIT:4 MEMORY ORGANIZATION 1 UNIT:4 MEMORY ORGANIZATION TOPICS TO BE COVERED. 4.1 Memory Hierarchy 4.2 Memory Classification 4.3 RAM,ROM,PROM,EPROM 4.4 Main Memory 4.5Auxiliary Memory 4.6 Associative Memory 4.7 Cache Memory 4.8

More information

Memory and Programmable Logic

Memory and Programmable Logic Memory and Programmable Logic Mano & Ciletti Chapter 7 By Suleyman TOSUN Ankara University Outline RAM Memory decoding Error detection and correction ROM Programmable Logic Array (PLA) Programmable Array

More information

Statement of Volatility WorkCentre 7525/7530/7535/7545/7556

Statement of Volatility WorkCentre 7525/7530/7535/7545/7556 Statement of Volatility WorkCentre 7525/7530/7535/7545/7556 Copyright 2006, 2008, 2009, 2010, 2011 Xerox Corporation Copyright protection claimed includes all forms and matters of copyrighted material

More information

Xerox Color 800i/1000i Press FreeFlow Print Server. Statement of Volatility Version 1.0

Xerox Color 800i/1000i Press FreeFlow Print Server. Statement of Volatility Version 1.0 Xerox Color 800i/1000i Press FreeFlow Print Server Statement of Volatility Version 1.0 June 2, 2016 Copyright 2006, 2008-2016 Xerox Corporation Copyright protection claimed includes all forms and matters

More information

Statement of Volatility Dell PowerEdge R730 and R730XD

Statement of Volatility Dell PowerEdge R730 and R730XD Statement of Volatility Dell PowerEdge R730 and R730XD Dell PowerEdge R730 and R730XD contains both volatile and non-volatile (NV) components. Volatile components lose their data immediately upon removal

More information

Resolving Security Issues When Working with the R&S ESIB in Secure Areas

Resolving Security Issues When Working with the R&S ESIB in Secure Areas Products: R&S EMI Test Receiver ESIB Resolving Security Issues When Working with the R&S ESIB in Secure Areas Based upon the user s requirements, this document describes the Rohde&Schwarz options available

More information

Agilent 86100D DCA-X Wide-Bandwidth Oscilloscope Mainframe. Declassification and Security

Agilent 86100D DCA-X Wide-Bandwidth Oscilloscope Mainframe. Declassification and Security Agilent Declassification and Security 5 May 2012 Page 1 of 10 Contacting Agilent Sales and Service Offices Assistance with test and measurements needs and information on finding a local Agilent office

More information

Statement of Volatility WorkCentre 7220/7225

Statement of Volatility WorkCentre 7220/7225 Statement of Volatility WorkCentre 7220/7225 Copyright 2006, 2008, 2009 Xerox Corporation Copyright protection claimed includes all forms and matters of copyrighted material and information now allowed

More information

CS 320 February 2, 2018 Ch 5 Memory

CS 320 February 2, 2018 Ch 5 Memory CS 320 February 2, 2018 Ch 5 Memory Main memory often referred to as core by the older generation because core memory was a mainstay of computers until the advent of cheap semi-conductor memory in the

More information

Statement of Volatility Dell DR6300, DR4300, and DR4300e

Statement of Volatility Dell DR6300, DR4300, and DR4300e Statement of Volatility Dell DR6300, DR4300, and DR4300e Dell DR4300, DR4300e and DR6300 contain both volatile and non-volatile (NV) components. Volatile components lose their data immediately upon removal

More information

Lecture Objectives. Introduction to Computing Chapter 0. Topics. Numbering Systems 04/09/2017

Lecture Objectives. Introduction to Computing Chapter 0. Topics. Numbering Systems 04/09/2017 Lecture Objectives Introduction to Computing Chapter The AVR microcontroller and embedded systems using assembly and c Students should be able to: Convert between base and. Explain the difference between

More information

Computer Organization and Assembly Language (CS-506)

Computer Organization and Assembly Language (CS-506) Computer Organization and Assembly Language (CS-506) Muhammad Zeeshan Haider Ali Lecturer ISP. Multan ali.zeeshan04@gmail.com https://zeeshanaliatisp.wordpress.com/ Lecture 2 Memory Organization and Structure

More information

Memory Pearson Education, Inc., Hoboken, NJ. All rights reserved.

Memory Pearson Education, Inc., Hoboken, NJ. All rights reserved. 1 Memory + 2 Location Internal (e.g. processor registers, cache, main memory) External (e.g. optical disks, magnetic disks, tapes) Capacity Number of words Number of bytes Unit of Transfer Word Block Access

More information

DIGITAL SYSTEM FUNDAMENTALS (ECE421) DIGITAL ELECTRONICS FUNDAMENTAL (ECE422)

DIGITAL SYSTEM FUNDAMENTALS (ECE421) DIGITAL ELECTRONICS FUNDAMENTAL (ECE422) COURSE / CODE DIGITAL SYSTEM FUNDAMENTALS (ECE421) DIGITAL ELECTRONICS FUNDAMENTAL (ECE422) Memory In computing, memory refers to the computer hardware devices used to store information for immediate use

More information

Discovering Computers 2012

Discovering Computers 2012 Discovering Computers 2012 Your Interactive Guide to the Digital World Edited by : Asma AlOsaimi The System Unit Memory The inside of the system unit on a desktop personal computer includes: Drive bay(s)

More information

Administrative Inquiry (AI) Guidelines for Information Systems (IS)

Administrative Inquiry (AI) Guidelines for Information Systems (IS) Administrative Inquiry (AI) Guidelines for Information Systems (IS) Guidelines for Conducting an AI Involving a Nonaccredited IS The format of the information is NOT important. Classified information,

More information

Statement of Volatility Xerox CiPress Production Inkjet System

Statement of Volatility Xerox CiPress Production Inkjet System Statement of Volatility Xerox CiPress Production Inkjet System Copyright 2006, 2008, 2009, 2010, 2011, 2012, 2013 Xerox Corporation Copyright protection claimed includes all forms and matters of copyrighted

More information

Xerox DocuColor 7000/7000AP/8000/8000AP Digital Color Press. Memory Volatility Statement

Xerox DocuColor 7000/7000AP/8000/8000AP Digital Color Press. Memory Volatility Statement Xerox DocuColor 7000/7000AP/8000/8000AP Digital Color Press Memory Volatility Statement October 26, 2007 Version V1.3 Copyright 2006, 2007 Xerox Corporation Copyright protection claimed includes all forms

More information

COMP3221: Microprocessors and. and Embedded Systems. Overview. Lecture 23: Memory Systems (I)

COMP3221: Microprocessors and. and Embedded Systems. Overview. Lecture 23: Memory Systems (I) COMP3221: Microprocessors and Embedded Systems Lecture 23: Memory Systems (I) Overview Memory System Hierarchy RAM, ROM, EPROM, EEPROM and FLASH http://www.cse.unsw.edu.au/~cs3221 Lecturer: Hui Wu Session

More information

1. Explain in detail memory classification.[summer-2016, Summer-2015]

1. Explain in detail memory classification.[summer-2016, Summer-2015] 1. Explain in detail memory classification.[summer-2016, Summer-2015] RAM The memory is a basic component of a microcomputer system. It stores binary instructions and data for the microprocessor. There

More information

k -bit address bus n-bit data bus Control lines ( R W, MFC, etc.)

k -bit address bus n-bit data bus Control lines ( R W, MFC, etc.) THE MEMORY SYSTEM SOME BASIC CONCEPTS Maximum size of the Main Memory byte-addressable CPU-Main Memory Connection, Processor MAR MDR k -bit address bus n-bit data bus Memory Up to 2 k addressable locations

More information

William Stallings Computer Organization and Architecture 8th Edition. Chapter 5 Internal Memory

William Stallings Computer Organization and Architecture 8th Edition. Chapter 5 Internal Memory William Stallings Computer Organization and Architecture 8th Edition Chapter 5 Internal Memory Semiconductor Memory The basic element of a semiconductor memory is the memory cell. Although a variety of

More information

Resolving Security Issues when working with R&S SMU200A, R&S SMATE200A, R&S SMJ100A, R&S AMU200A, or R&S AFQ100A or R&S AFQ100B in Secure Areas

Resolving Security Issues when working with R&S SMU200A, R&S SMATE200A, R&S SMJ100A, R&S AMU200A, or R&S AFQ100A or R&S AFQ100B in Secure Areas Products: Signal Generators R&S SMU200A, R&S SMATE200A, R&S SMJ100A, R&S AMU200A, R&S AFQ100A, R&S AFQ100B Resolving Security Issues when working with R&S SMU200A, R&S SMATE200A, R&S SMJ100A, R&S AMU200A,

More information

Statement of Volatility WorkCentre 7830/7835/7845/7855

Statement of Volatility WorkCentre 7830/7835/7845/7855 Statement of Volatility WorkCentre 7830/7835/7845/7855 Copyright 2006, 2008, 2009 Xerox Corporation Copyright protection claimed includes all forms and matters of copyrighted material and information now

More information

Sir Sadiq s computer notes for class IX. Chapter no 4. Storage Devices

Sir Sadiq s computer notes for class IX. Chapter no 4. Storage Devices 17 Q: Define Computer memory or storage. Ans: Memory: Memory refers to the place where data is kept for later use. For example, a human being has a memory where he/she stores the things that can be recalled

More information

Policy & Procedure HIPAA / PRIVACY DESTRUCTION

Policy & Procedure HIPAA / PRIVACY DESTRUCTION PURPOSE To ensure that any medium containing Protected Health Information ( PHI ) is properly destroyed. POLICY PHI stored in paper, electronic or other format will be destroyed utilizing an acceptable

More information

Xerox Color Press

Xerox Color Press Statement of Volatility Xerox Color 800-1000 Press Copyright 2009, 2010 Xerox Corporation Copyright protection claimed includes all forms and matters of copyrighted material and information now allowed

More information

Agilent Microwave Sweep Oscillator and Network Analyzer Instrument Security

Agilent Microwave Sweep Oscillator and Network Analyzer Instrument Security Discontinued Product Information For Support Reference Only Information herein, may refer to products/services no longer supported. We regret any inconvenience caused by obsolete information. For the latest

More information

Statement of Volatility Xerox igen TM 150 Digital Press

Statement of Volatility Xerox igen TM 150 Digital Press Statement of Volatility Xerox igen TM 150 Digital Press Copyright 2006, 2008, 2009, 2010, 2011, 2012 Xerox Corporation Copyright protection claimed includes all forms and matters of copyrighted material

More information

Large and Fast: Exploiting Memory Hierarchy

Large and Fast: Exploiting Memory Hierarchy CSE 431: Introduction to Operating Systems Large and Fast: Exploiting Memory Hierarchy Gojko Babić 10/5/018 Memory Hierarchy A computer system contains a hierarchy of storage devices with different costs,

More information

Tektronix 4000 Series Oscilloscopes Declassification and Security Instructions

Tektronix 4000 Series Oscilloscopes Declassification and Security Instructions xx ZZZ Tektronix 4000 Series Oscilloscopes Declassification and Security Instructions Revision B www.tektronix.com 071-2196-00 Copyright Tektronix. All rights reserved. Licensed software products are owned

More information

Statement of Volatility WorkCentre 5845/5855/5865/5875/5890

Statement of Volatility WorkCentre 5845/5855/5865/5875/5890 Statement of Volatility WorkCentre 5845/5855/5865/5875/5890 Copyright 2006, 2008, 2009. 2010, 2011, 2012,. 2013 Xerox Corporation Copyright protection claimed includes all forms and matters of copyrighted

More information

Basic Organization Memory Cell Operation. CSCI 4717 Computer Architecture. ROM Uses. Random Access Memory. Semiconductor Memory Types

Basic Organization Memory Cell Operation. CSCI 4717 Computer Architecture. ROM Uses. Random Access Memory. Semiconductor Memory Types CSCI 4717/5717 Computer Architecture Topic: Internal Memory Details Reading: Stallings, Sections 5.1 & 5.3 Basic Organization Memory Cell Operation Represent two stable/semi-stable states representing

More information

ECSE-2610 Computer Components & Operations (COCO)

ECSE-2610 Computer Components & Operations (COCO) ECSE-2610 Computer Components & Operations (COCO) Part 18: Random Access Memory 1 Read-Only Memories 2 Why ROM? Program storage Boot ROM for personal computers Complete application storage for embedded

More information

Operating Systems. Instructor: Dmitri A. Gusev. Spring Lecture 16, April 17, CSC : Introduction to Computer Science

Operating Systems. Instructor: Dmitri A. Gusev. Spring Lecture 16, April 17, CSC : Introduction to Computer Science Operating Systems Instructor: Dmitri A. Gusev Spring 2007 CSC 120.02: Introduction to Computer Science Lecture 16, April 17, 2007 Functions of an Operating System The operating system (OS) is the core

More information

Database Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill

Database Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill Lecture Handout Database Management System Lecture No. 34 Reading Material Database Management Systems, 2nd edition, Raghu Ramakrishnan, Johannes Gehrke, McGraw-Hill Modern Database Management, Fred McFadden,

More information

Synergy Controller Application Note 126 March 2015, Revision - Tidal Engineering Corporation 2015

Synergy Controller Application Note 126 March 2015, Revision - Tidal Engineering Corporation 2015 Synergy Nano Certificate of Volatility Overview This is a statement regarding the volatility of customer data stored in the memory devices in the Synergy Nano environmental test chamber controller manufactured

More information

Chapter 5 Internal Memory

Chapter 5 Internal Memory Chapter 5 Internal Memory Memory Type Category Erasure Write Mechanism Volatility Random-access memory (RAM) Read-write memory Electrically, byte-level Electrically Volatile Read-only memory (ROM) Read-only

More information

machine cycle, the CPU: (a) Fetches an instruction, (b) Decodes the instruction, (c) Executes the instruction, and (d) Stores the result.

machine cycle, the CPU: (a) Fetches an instruction, (b) Decodes the instruction, (c) Executes the instruction, and (d) Stores the result. Central Processing Unit (CPU) A processor is also called the CPU, and it works hand in hand with other circuits known as main memory to carry out processing. The CPU is the "brain" of the computer; it

More information

Model Answer paper Guru Ghasidas Vishwavidyalaya (Bilaspur ) B.COM(Third Semester) Examination, 2014 Fundamentals of Computers Paper Code: BC-307

Model Answer paper Guru Ghasidas Vishwavidyalaya (Bilaspur ) B.COM(Third Semester) Examination, 2014 Fundamentals of Computers Paper Code: BC-307 Model Answer paper Guru Ghasidas Vishwavidyalaya (Bilaspur ) B.COM(Third Semester) Examination, 2014 Fundamentals of Computers Paper Code: BC-307 Section- A What are the basic 3 part of the computer? Ans:

More information

CIP Cyber Security Information Protection

CIP Cyber Security Information Protection A. Introduction 1. Title: Cyber Security Information Protection 2. Number: CIP-011-2 3. Purpose: To prevent unauthorized access to BES Cyber System Information by specifying information protection requirements

More information

Xerox IJ Print Server Powered By Fiery. Information Assurance Disclosure

Xerox IJ Print Server Powered By Fiery. Information Assurance Disclosure Xerox IJ Print Server Powered By Fiery 2017 Electronics For Imaging, Inc. This documentation is protected by copyright, and all rights are reserved. No part of it may be reproduced or transmitted in any

More information

Contents. Memory System Overview Cache Memory. Internal Memory. Virtual Memory. Memory Hierarchy. Registers In CPU Internal or Main memory

Contents. Memory System Overview Cache Memory. Internal Memory. Virtual Memory. Memory Hierarchy. Registers In CPU Internal or Main memory Memory Hierarchy Contents Memory System Overview Cache Memory Internal Memory External Memory Virtual Memory Memory Hierarchy Registers In CPU Internal or Main memory Cache RAM External memory Backing

More information

Computer Organization

Computer Organization Objectives 5.1 Chapter 5 Computer Organization Source: Foundations of Computer Science Cengage Learning 5.2 After studying this chapter, students should be able to: List the three subsystems of a computer.

More information

COA. Prepared By: Dhaval R. Patel Page 1. Q.1 Define MBR.

COA. Prepared By: Dhaval R. Patel Page 1. Q.1 Define MBR. Q.1 Define MBR. MBR( Memory buffer register) A Memory Buffer Register (MBR) is the register in a computers processor that stores the data being transferred to and from the devices It allowing the processor

More information

ConnectKey 2.0 WorkCentre 3655i 3655

ConnectKey 2.0 WorkCentre 3655i 3655 ConnectKey 2.0 WorkCentre 3655i 3655 Statement of Volatility Version 1.0 2016 Xerox Corporation. All rights reserved. Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in

More information

Mother Board And Its Components By :- IMRAN QURESHI

Mother Board And Its Components By :- IMRAN QURESHI Mother Board And Its Components By :- IMRAN QURESHI ARYAN COLLEGE 1 Mother Board Conte nts:- Components of mother board. Central Processing Unit. Bios function Capacitors. External Device. Internal Device.

More information

Unit 5: Memory Organizations

Unit 5: Memory Organizations Memory Organizations Unit 5: Memory Organizations Introduction This unit considers the organization of a computer's memory system. The characteristics of the most important storage technologies are described

More information

TG8000 Multiformat Test Signal Generator Declassification and Security Instructions

TG8000 Multiformat Test Signal Generator Declassification and Security Instructions xx ZZZ TG8000 Multiformat Test Signal Generator Declassification and Security Instructions www.tek.com *P077068801* 077-0688-01 Copyright Tektronix. All rights reserved. Licensed software products are

More information