Solved

NEC Ram Module

Posted on 2000-04-18
7
396 Views
Last Modified: 2013-11-10
I have as NEC memory module with the following markings on each of the two chips: 4218160-70 and 9451AU600.

the back of the board contins the following:P7460 and P10-14B74600.

Can anyone advise me as to the capacity of the module and whether it is parity or not.
0
Comment
Question by:rlpp
  • 4
  • 3
7 Comments
 
LVL 7

Accepted Solution

by:
frache earned 50 total points
ID: 2727281


4218160 : 1Mb *16 soit 2Mo each chip
Fast page mode ( no EDO ram).

(http://www.necel.com/home.nsf/Main?ReadForm&Memory+Products)

2 chips = 4 Mo

70 = 70 ns : access time
9451 : 1994 - week 51 ( december)

2 chips : no parity ( no bits for parity )


Each module = 4Mo / 70 ns
0
 
LVL 7

Expert Comment

by:frache
ID: 2727330

More details :

1 Mb = 1 000 000 bit
1 octet = 8 bits
16 * 1 M = 16 Mb = 16/8 Mo = 2 Mo

1 module = 32 * 1 Mb = 32 Mb = 32/8 Mo= 4 Mo.

Parity : you need one bit more per octet
-> 4 (8+1) * 1 Mb = 36 Mb ... you have only 32 Mb
ECC    : you need two bits more per octet
-> 4 (8+2) * 1 Mb = 40 Mb ...




0
 

Author Comment

by:rlpp
ID: 2727463
Thanks for your help. This is information which NEC refused to answer.
0
Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

 

Author Comment

by:rlpp
ID: 2730327
Thanks Frache.

Excuse my ignorance, but what is an Mo.
0
 
LVL 7

Expert Comment

by:frache
ID: 2733602

1 Mo = 8 Mb
1 Mb = 1024 bits

-> 1 Mo = 8 * 1024 * 1024 bits.
-> 1 bit = 1 binary data ( 0 or 1).

0
 

Author Comment

by:rlpp
ID: 2734487
Thanks for the clarification.
0
 
LVL 7

Expert Comment

by:frache
ID: 2734636
Ok, have a nice day.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Looking for a laptop computer  that match my needs 5 55
new laptop new users 8 73
Repair SAS HDD 5 66
Hardware keyboards 11 41
Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question