Manual As a PDF File

Total Page:16

File Type:pdf, Size:1020Kb

Manual As a PDF File © CnW Recovery Developments Ltd, 2020 © CnW Recovery Software 2013 Table of Contents CnW Recovery 6 Introduction 9 Demo program 12 Demo Status 13 Software limitations 14 Installation 15 Dongle installation 17 Media detection 20 Configuration for CnW Recovery Software 23 Recovery options 25 Registration 26 Directories 28 Hardware config 29 Basic Rules of Data Recovery 30 What to do when media has failed 30 Hardware failure - what next? 32 Welcome screen and wizard 33 Unrecognised media 35 Mini DVD recovery 37 Create new video DVD 39 Photo Recovery 40 AVCHD recovery 41 3GP and MP4 recovery wizard 43 ZIP and DOCX recovery wizard 48 Video scan of hard drive 49 Verify disk structure 50 Physical Media Test 52 Failing disk drive 54 Formatted disk recovery 55 Partitioned disk recovery 57 AVI Recovery 58 Forensic Data recovery 59 Recovering Files 60 Getting started - General data recovery 60 Typical data recovery procedures 62 View sector on hard drive, flash memory or CD 63 Disk imaging 65 Raid disks 67 How to use incremental imaging to recover damaged drives 68 Disks with single head failure 70 Image file selection 71 Partitions, analysis and recovery 73 Partition analysis mode 76 Partition Table structure 77 How to recover corrupted partitions 79 GUID Partition tables 81 Magnetic Media Recognition 82 Deleted file recovery 83 CD Recovery 84 How to recognise type of CD/DVD 86 p2 © CnW Recovery Software 2013 UDF Anchor Volume 88 Unerase CD-RW 89 Multi-session UDF 92 Camcorder Recovery 93 Rebuild video disk files 95 FAT Disk restore 97 How to recovery FAT disk when boot sector and one FAT is missing 101 BIOS Parameter FDC descriptor for FAT 103 Missing directories and files on a FAT disk 105 How to recover FAT disk when boot sector is missing 106 FAT 32 deleted file recovery 107 FAT File allocation table validation and correction 109 Recover FAT32 disk when it has been reformatted as NTFS 110 exFAT 111 Linux and Unix recovery 112 Macintosh Recovery 114 MTF .BKF files 117 NTFS Recovery 118 BIOS Parameter FDC descriptor for NTFS 123 NTFS MTF range 124 Search for MFTs 125 Files lost when NTFS reloaded 127 Cannot read first mft, copy failed 129 NTFS with confused partitions 130 Alternate Data Stream 131 Recovering when a new /different operating has been loaded 132 Deleted Partition 134 How to find and recover lost files 135 Recovery from a drive with many bad sectors 136 Data carving options 138 Raw files 140 Search String 141 Recovering files from image format 143 Fragmented file processing 144 Jpeg images and metadata 147 Fragmented Files 148 Fragmented AVI files 150 Tutorials 151 General NTFS Recovery 152 Recover video from camcorder with a hard drive 154 Recovery of lost files on an otherwise working disk 155 Photo recovery 156 Imaging failing drive 157 Video file recovery 159 Video recovery from mini-DVDs 159 Video recovery from memory devices 161 MP4 disk layouts 162 mp4_scan 165 MP4 file structure 166 GoPro video recovery 167 HP MediaVault data recovery 169 HP Mediavault Tutorial 170 Forensic Tools 173 CnW Recovery forensic investigation tools 173 p3 © CnW Recovery Software 2013 Discover deleted files 176 ISO9660 and Joliet investigation 177 UDF forensic investigation 178 NTFS forensic investigation 179 MFT Parse 180 DVD Properties 182 Data Carving 183 Manual Data Carving 185 Data Carving with an Excel File 186 File Validation 188 Search for strings 189 XML Forensic Report 190 NSRL Hash tables 192 Disk scan 193 Virtual disk image 195 Forensic analysis tips 196 File selection 197 Overview 197 File extension selection 199 Date selection 200 Directory selection 201 File name selection 202 File selection based on MD5 value 203 File size selection 204 Import List 206 RAID drives 207 RAID drive selection 209 RAID configuration 210 RAID boxes and configurations 212 RAID JBOD 213 Typical RAID setup parameters 215 HP Mediavault recovery 216 Fragmented files 218 Fragmented 3GP/MP4 files 218 Typical 3GP corruptions 221 Fragmented Zip and DOCX files 222 Recognising Sectors 225 Master Boot Record 225 GUID Partition sectors 227 BIOS Parameter Block BPB 229 FAT directory entry 231 NTFS directory entry, MFT 233 Disk clusters 235 Apple Volume Header 237 VMFS sectors 238 General tools 240 Split directories 240 Merge disk images 241 eMail Extraction 242 User passwords 243 AVCHD reconstruction 244 Extract and join 245 Fake memory test 246 Reconstruction tips 247 p4 © CnW Recovery Software 2013 eMail restoration 247 Logs 248 Log overview 248 File details 249 Search for sector 253 File fragments 254 Job details 255 Forensic Report 258 Keyword search 260 Trace file 261 Errors and problems 262 An error occurred in an unknown file 262 Missing files 263 Error Messages 264 All files are short 265 Files not saved 266 CD physical structures 267 Disk at once 267 Track at once 269 Session at once 270 Packet writing 271 CD terms 272 Glossary 274 Terms 274 Useful links 275 Contact Us 276 Addresses, and contact details 276 p5 © CnW Recovery Software 2013 CnW Recovery Software Data recovery software for all PC storage devices o Introduction . Demo program . Software limitations . Installation . Media detection . Configuration of CnW Software Recovery options Registration Directories Hardware configuration o Welcome . Photo recovery . Mini DVD recovery Create new DVD . AVCHD recovery . Formatted disk recovery . Partitioned disk recovery . Failing disk drive . Physical media test . Verify disk structure . DOCX and Zip recovery o Recovering files - start here . Getting started . Typical data recovery procedures . View sector on hard drive . Deleted file recovery . CD Recovery . Camcorder recovery . Partitions, analysis and recovery . FAT Disk recovery BIOS Parameter FDC descriptor Recover FAT32 disk when it has been reformatted as NTFS NTFS MFT Range Search for MFTs Files lost when NTFS reloaded Recovering when a new operation system has been loaded Cannot read first MFT, copy failed NTFS with confused partitions . NTFS recovery BIOS parameter FDC description NTFS MFT range Search for MFTs Files lost when NTFS reloaded p6 © CnW Recovery Software 2013 Recovering files when a new or different file system has been loaded . Linux and Unix recovery . Macintosh recovery . RAID recovery RAID drive selection RAID configuration RAID JOBD Typical RAID setups HP Media Vault and Broadcom . MTF .BKF files and recovery . Deleted partition . How to find and recover lost files . Recovery from a drive with many bad sectors . Disk Image Recoverying files from image format RAID 0 disks How to use incremental imaging . Data carving options Raw files Search String o Tutorials . General NTFS recovery . Recover video from a camcorder with a hard drive - rather than a DVD . Recovery of lost files on an otherwise working disk . Photo recovery . Image a failing drive o HP Mediavault data recovery . HP Mediavault o RAID drives . RAID drive selection . RAID configuration . RAID boxes and configurations . RAID JBOD . Typical RAID setup parameters . HP Mediavault recovery from a RAID o Video recovery . Video recovery from mini-DVD . Video recovery from memory chips . MP4 disk layouts o Basic Rules of Recovery . What to do when media has failed . Hardware failure, what next o Forensic tools . CnW Recovery forensic investigation tools . Discover deleted files p7 © CnW Recovery Software 2013 . ISO9660 and Joliet investigation . UDF forensic investigation . NTFS forensic investigation . MFT parse . DVD properties . Manual data carving . File validation . Forensic analysis tips o Forensic Data Recovery o Recovering Files . Getting started - General data recovery . Typical data recovery procedures . View sector on hard drive . Disk imaging o File Selection . Overview . File name selection . Date selection . Directory selection . File selection based on MD5 value . File size selection . Import List o Forensic Tools . Recovery and forensic investigation tools . Discover deleted files . ISO9660 and Joliet investigation . UDF forensic investigation . NTFS forensic investigation . DVD properties . Data carving . Manual data carving . File validation . Forensic Reports - in XML o Logs . Log overview . File details . Search for sector . File fragments . Job details . Forensic report . Keyword search Last updated August 2020 Copyright CnW Recovery Developments Ltd -o- p8 © CnW Recovery Software 2013 Introduction CnW Data Recovery Software Recover lost or deleted data, files, photos and videos Partially failed, corrupted or quick reformatted disks Forensic investigation tools CnW Recovery is a program to recover and restore data from all CDs, DVDs, hard drives and memory chips. It recovers data from damaged and corrupted disks, memory chips, CDs and DVDs. It optionally provides a large amount of forensic analysis of the media including partial files, deleted files as well as data stored in unallocated space. The comprehensive program is configured with many options ranging from basic data recovery of CDs, and camera memory chips, up to full and automatic forensic analysis of most media. Full logs are created for the forensic applications, along with data hashing for security to verify that data has not been changed since restored. The basic functions of CnW are to list the disk properties, and to recover the data in one of several possible ways. Where ever possible, the program will determine the best mode of operation, but this can normally be overridden where the user has determined that a different mode may be more appropriate. CnW can be used to recover data from almost any Windows compatible storage device including the following o Hard disk drives o RAID 0 and RAID 5* configuration o LBA48 compatible, ie disks/RAIDs larger than 2TB can be read o Floppy disks o CDs and CD-RW o DVD and DVD-RW, including mini DVD o Iomega Rev drives o Optical disks o GoPro and DJI drone support o Flash memory p9 © CnW Recovery Software 2013 o Camera memory o Thumb drives and Pen drives o Jaz drives 1GB 2GB o Zip drives 100MB, 200MB, 750MB o Disk Image files The program operates with USB, IDE, Firewire, S-ATA or SCSI drives on a Windows 2000, Windows XP or Vista system.
Recommended publications
  • Active@ Boot Disk User Guide Copyright © 2008, LSOFT TECHNOLOGIES INC
    Active@ Boot Disk User Guide Copyright © 2008, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from LSOFT TECHNOLOGIES INC. LSOFT TECHNOLOGIES INC. reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of such revision or change. LSOFT TECHNOLOGIES INC. provides this documentation without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. LSOFT may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. All technical data and computer software is commercial in nature and developed solely at private expense. As the User, or Installer/Administrator of this software, you agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC. Other brand and product names may be registered trademarks or trademarks of their respective holders. 2 Active@ Boot Disk User Guide Contents 1.0 Product Overview ..........................................................................................................
    [Show full text]
  • Active@ UNDELETE Documentation
    Active @ UNDELETE Users Guide | Contents | 2 Contents Legal Statement.........................................................................................................5 Active@ UNDELETE Overview............................................................................. 6 Getting Started with Active@ UNDELETE.......................................................... 7 Active@ UNDELETE Views And Windows...................................................................................................... 7 Recovery Explorer View.......................................................................................................................... 8 Logical Drive Scan Result View..............................................................................................................9 Physical Device Scan View......................................................................................................................9 Search Results View...............................................................................................................................11 File Organizer view................................................................................................................................ 12 Application Log...................................................................................................................................... 13 Welcome View........................................................................................................................................14 Using
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Chapter 9: Peripheral Devices—Overview D a 2/E
    C S Chapter 9: Peripheral Devices—Overview D A 2/e Magnetic disk drives: ubiquitous and complex Other moving media devices: tape and CD ROM Display devices Video monitors: analog characteristics Video terminals Memory mapped video displays Flat panel displays Printers: dot matrix, laser, inkjet Manual input: keyboards and mice A to D and D to A converters: the analog world Computer Systems Design and Architecture Second Edition © 2004 Prentice Hall C S Tbl 9.1 Some Common Peripheral Interface D Standards A 2/e Bus Standard Data Rate Bus Width Centronics ~50KB/s 8-bit parallel EIA RS232/422 30-20K B/s bit-serial SCSI 10-500 MB/s 16-bit parallel Ethernet 10-1000 Mb/s bit-serial USB 1.5-12 Mb/s bit-serial USB-2 480 Mb/s bit-serial FireWire† 100-400 Mb/s bit-serial FireWire-800† 800 Mb/s bit-serial †Also known as Sony iLink, or IEEE1394 and 1394b, respectively Computer Systems Design and Architecture Second Edition © 2004 Prentice Hall C S Disk Drives—Moving Media Magnetic D Recording A 2/e High density and non-volatile Densities approaching semiconductor RAM on an inexpensive medium No power required to retain stored information Motion of medium supplies power for sensing More random access than tape: direct access Different platters selected electronically Track on platter selected by head movement Cyclic sequential access to data on a track Structured address of data on disk Drive: Platter: Track: Sector: Byte Computer Systems Design and Architecture Second Edition © 2004 Prentice Hall C S Fig 9.3 Cutaway View of a Multi-Platter
    [Show full text]
  • Diskgenius User Guide (PDF)
    www.diskgenius.com DiskGenius® User Guide The information in this document is subject to change without notice. This document is not warranted to be error free. Copyright © 2010-2021 Eassos Ltd. All Rights Reserved 1 / 236 www.diskgenius.com CONTENTS Introduction ................................................................................................................................. 6 Partition Management ............................................................................................................. 6 Create New Partition ........................................................................................................ 6 Active Partition (Mark Partition as Active) .............................................................. 10 Delete Partition ................................................................................................................ 12 Format Partition ............................................................................................................... 14 Hide Partition .................................................................................................................... 15 Modify Partition Parameters ........................................................................................ 17 Resize Partition ................................................................................................................. 20 Split Partition ..................................................................................................................... 23 Extend
    [Show full text]
  • How to Recover Data from a Broken Hard Drive
    How to Recover Data From a Broken Hard Drive Home Index Donate About Contact Us geekyprojects.com Web How to Recover Data From a Broken Hard Drive18. May 2007, 3:09 Uhr Pablo Garcia If you are reading this article you are probably desperate, but before you panic let me tell you that there is hope, and there is probably more hope than you think…. Even if your hard drive has an internal mechanical malfunction, data can be recovered without having to send the hard Data backup and recovery drive to a data recovery service. Yes! you heard right, I’m Data Center Aligns IT Resources To About Business Needs & Gives Good Benefit sure you have come across articles that will tell you how What is GEEKYPROJECTS all about? Cisco.com/in/DataCenter to recover data from a damaged partition, you will find a Geeky Projects is a site conceived in hopes of ton of those on the web, but when your hard drive starts gathering and documenting interesting projects. malfunctioning none of those articles are going to help We focus on creating quality articles that help you solve your problem, This article will. you become more efficient. more about » Feeds Corrupted file system RSS Posts If the hard drive gets detected by Windows and can be accessed but you do not see any data inside, or you get a RSS Comments message saying that the drive needs to be formatted. You probably have a corrupted file system in you hands. The solution for this is a good file recovery software.
    [Show full text]
  • A Study of Hard Drive Forensics on Consumers' Pcs: Data
    A Study of Hard Drive Forensics on Consumers’ PCs: Data Recovery and Exploitation B. Dawn Medlin Appalachian State University Joseph A. Cazier Appalachian State University One of the first actions to take when getting rid of an old personal computer is to remove all of the files that contain identifying and personal information. Individuals can be surprisingly negligent in this effort. Many individuals may also believe that by simply moving their files to the recycle bin and then emptying that bin that all of their programs and files are permanently erased. If personal information is not totally deleted, acts of identity theft can easily occur. Our research study identified the types of information found and/or recovered from hard disk drives on computers that have been donated to charity, sold second-hand, or otherwise donated to other organizations for reuse. Of the fifty-five hard drives studied approximately 300,000 files contained identifiable information. Results showed the need for further training in relation to total file erasure from a hard drive as well as the negative results such as identity theft that can occur due to this lack of training or knowledge. INTRODUCTION Wiping a computer clean is not as easy as it may appear. Just deleting the personal files and emptying the recycle bin is essentially next to useless. The delete function only removes file names from a directory list and makes the sectors the files occupy on the hard drive available for future use. Meanwhile, these files actually continue to exist. To positively prevent data from recovery, disks can be removed from disk drives and broken up, or even ground to microscopic pieces.
    [Show full text]
  • Operating Systems Disk Management
    Operating Systems Disk Management Disks, SSDs, RAID, Caching Peter R. Pietzuch [email protected] Disks have come a long way... • IBM 305 RAMAC (1956) – First commercial hard disk: 4.4MB – Footprint: 1.5 m2 – Price: $160,000 • Toshiba 0.85” disk (2005) – Capacity: 4GB – Price: <$300 1 Disk Evolution • Capacity increases exponentially – Access speeds not so much... (why?) 2 Disk Evolution http://www.anandtech.com/show/9866/hard-disk-drives-with-hamr-technology-set-to-arrive-in-2018 3 What is driving demand? Eric Brewer. https://www.usenix.org/sites/default/files/conference/protected-files/fast16_slides_brewer.pdf 4 Disk Storage Devices 5 Tracks and Cylinders Track Track Cylinder Track Track 6 Sample Disk Specification Parameter IBM 360KB Seagate floppy disk Barracuda ST3400832AS No. of cylinders 40 16,383 Tracks / cylinder 2 16 Sectors / track 9 63 Bytes / sector 512 512 Sectors / disk 720 781,422,768 Disk capacity 360KB 400GB 7 Sector Layout • Surface divided into 20 or more zones – Outer zones have more sectors per track – Ensures that sectors have same physical length – Zones hidden using virtual geometry 8 Disk Addressing • Physical hardware address: (cylinder, surface, sector) – But actual geometry complicated è hide from OS • Modern disks use logical sector addressing (or logical block addresses LBA) – Sectors numbered consecutively from 0..n – Makes disk management much easier – Helps work around BIOS limitations • Original IBM PC BIOS 8GB max • 6 bits for sector, 4 bits for head, 14 bits for cylinder 9 Disk Capacity • Disk capacity
    [Show full text]
  • Performance of Android Forensics Data Recovery Tools
    This is author accepted copy; for final version please refer to: B.C. Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo, “Performance of Android Forensics Data Recovery Tools”, Pages 91-110, Chapter 7, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications Performance of Android Forensics Data Recovery Tools Bernard Chukwuemeka Ogazi-Onyemaechi1, Ali Dehghantanha1; Kim-Kwang Raymond Choo2 1School of Computing, Science and Engineering, University of Salford, Manchester, United Kingdom 2 Information Assurance Research Group, University of South Australia, Australia [email protected]; [email protected]; [email protected] Abstract- Recovering deleted or hidden data is among most important duties of forensics investigators. Extensive utilisation of smartphones as subject, objects or tools of crime made them an important part of residual forensics. This chapter investigates the effectiveness of mobile forensic data recovery tools in recovering evidences from a Samsung Galaxy S2 i9100 Android phone. We seek to determine the amount of data that could be recovered using Phone image carver, Access data FTK, Foremost, Diskdigger, and Recover My File forensic tools. The findings reflected the difference between recovery capacities of studied tools showing their suitability in their specialised contexts only. Keywords: Data recovery, digital forensics, deleted file recovery, mobile forensics, Android forensics. 1 1.0 INTRODUCTION Smart mobile devices, particularly smartphones, are increasingly popular in today’s Internet-connected society (1–4). For example, few years ago in 2010, shipments of smartphone grew by 74 percent to 295 million units (3,4). Unsurprisingly, sales of smartphones have been increasing since then (5,6), and it has been estimated that 1.5 billion smartphones will be sold by 2017 and 1 billion mobile subscribers by 2022 (7–15).
    [Show full text]
  • File Allocation Table - Wikipedia, the Free Encyclopedia Page 1 of 22
    File Allocation Table - Wikipedia, the free encyclopedia Page 1 of 22 File Allocation Table From Wikipedia, the free encyclopedia File Allocation Table (FAT) is a file system developed by Microsoft for MS-DOS and is the primary file system for consumer versions of Microsoft Windows up to and including Windows Me. FAT as it applies to flexible/floppy and optical disc cartridges (FAT12 and FAT16 without long filename support) has been standardized as ECMA-107 and ISO/IEC 9293. The file system is partially patented. The FAT file system is relatively uncomplicated, and is supported by virtually all existing operating systems for personal computers. This ubiquity makes it an ideal format for floppy disks and solid-state memory cards, and a convenient way of sharing data between disparate operating systems installed on the same computer (a dual boot environment). The most common implementations have a serious drawback in that when files are deleted and new files written to the media, directory fragments tend to become scattered over the entire disk, making reading and writing a slow process. Defragmentation is one solution to this, but is often a lengthy process in itself and has to be performed regularly to keep the FAT file system clean. Defragmentation should not be performed on solid-state memory cards since they wear down eventually. Contents 1 History 1.1 FAT12 1.2 Directories 1.3 Initial FAT16 1.4 Extended partition and logical drives 1.5 Final FAT16 1.6 Long File Names (VFAT, LFNs) 1.7 FAT32 1.8 Fragmentation 1.9 Third party
    [Show full text]
  • R-Linux User's Manual
    User's Manual R-Linux © R-Tools Technology Inc 2019. All rights reserved. www.r-tt.com © R-tools Technology Inc 2019. All rights reserved. No part of this User's Manual may be copied, altered, or transferred to, any other media without written, explicit consent from R-tools Technology Inc.. All brand or product names appearing herein are trademarks or registered trademarks of their respective holders. R-tools Technology Inc. has developed this User's Manual to the best of its knowledge, but does not guarantee that the program will fulfill all the desires of the user. No warranty is made in regard to specifications or features. R-tools Technology Inc. retains the right to make alterations to the content of this Manual without the obligation to inform third parties. Contents I Table of Contents I Introduction to R-Linux 1 1 R-Studi.o.. .F..e..a..t.u..r.e..s.. ................................................................................................................. 2 2 R-Linux.. .S..y..s.t.e..m... .R...e..q..u..i.r.e..m...e..n..t.s. .............................................................................................. 4 3 Contac.t. .I.n..f.o..r.m...a..t.i.o..n.. .a..n..d.. .T..e..c..h..n..i.c.a..l. .S...u..p..p..o..r.t. ......................................................................... 4 4 R-Linux.. .M...a..i.n.. .P..a..n..e..l. .............................................................................................................. 5 5 R-Linu..x.. .S..e..t.t.i.n..g..s. .................................................................................................................. 10 II Data Recovery Using R-Linux 16 1 Basic .F..i.l.e.. .R..e..c..o..v..e..r.y.. ............................................................................................................ 17 Searching for.
    [Show full text]
  • Backing Storage
    Student Notes Theory Storage Further Reading Merlin Pg 253 Glossary Pg 134 Introduction All computer systems need to store data. This is done: Temporarily while a program is running. This is stored in main memory. Long-term to preserve programs and data while not in use. This is called backing storage. So you can see how a computer system uses two types of memory: Main memory holds all of the essential memory that tells your computer how to be a computer. Backing storage holds the information that you store on backup storage devices. Note: Memory is another term used for storage. Uses of Main and Backing Storage Main memory is a temporary area for holding data, instructions, and information. Main Memory is also known as main store or primary storage. The main store (main memory) is needed: To store the program currently being executed To hold data produced as the program is run To hold other data such as the contents of the screen. The backing store is needed: For long-term storage of data and programs For data and programs where there is not enough room in the main store. Block Diagram of the Computer System showing the Main & Backing Storage The Central Processing Unit (CPU) is the unit responsible for the processing of data. The CPU is made up of 3 parts: the Control Unit (CU), the Arithmetic and Logic Unit (ALU) and Main Memory CPU = CU + ALU + Main Memory 1/ 15 K. Aquilina Student Notes Main Memory Theory Main memory holds programs and data that the user is currently working with.
    [Show full text]