
Ultimately, RAM allows you to access multiple programs at once with speed and efficiency. In contrast, if you want to keep anything to work on later, you put it into a desk drawer - or store it on a hard disk, either locally or in the cloud. Your working space - where you scribble on something immediately - is the top of the desk, where you want everything within arm’s reach and you want no delay in finding anything. It can help to think about RAM with the analogy of a physical desktop. So what is RAM used for, then? It’s very fast, which makes it ideal for things the computer is actively working on, such as applications that are currently running (for example, the web browser in which you’re reading this article) and the data those applications work on or with (such as this article). RAM is temporary storage that goes away when the power turns off. But the working processes are done in RAM. Nearly all computers also have some way to store information for longer-term access, too. In contrast, a computer’s hard disk or SDD is its long-term memory, where things are stored more or less permanently.Įvery computing device has RAM, whether it’s a desktop computer (running Windows, MacOS, or Linux), a tablet or smartphone, or even a special-purpose computing device (such as a smart TV).

RAM is your computer’s short-term memory.

MAC STROBE RPM APP FOR RECORDS MAC
What is RAM? | Random Access Memory Definition | Avast Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_PrivacyĬomputers are always loading things in to work on - such as applications and data - and then setting them aside for later.
