Because the Apple Worm performs dynamic self-relocation within the one main memory of one computer, it does not constitute a computer virus, an apt if somewhat inaccurate description.
Apple Computer | Computer Science | computer | computer science | 3D computer graphics | personal computer | Mainframe computer | Computer network | Computer-generated imagery | Computer programming | memory | Sony Computer Entertainment | Read-only memory | Computer hardware | 2D computer graphics | Computer science | Hacker (computer security) | Computer Sciences Corporation | Computer program | Personal Computer | computer program | Computer file | mainframe computer | computer security | Prime Computer | IEEE Computer Society | IBM Personal Computer | computer hardware | computer graphics | computer animation |
In most computer systems, CPUs and memory are coldpluggable, but it is common for high-end servers and mainframes to feature hotplug capability of these components.
Both techniques induce an electromagnetic field, corrupting the memory and shorting out the circuitry of any electronic device within range.
Like many memoized codes, Hashlife can consume significantly more memory than other algorithms, especially on moderate-sized patterns with a lot of entropy, or which contain subpatterns poorly aligned to the bounds of the quadtree nodes (i.e. power-of-two sizes); the cache is a vulnerable component.
Delay line memory, a form of computer memory used on some of the earliest digital computers
Qimonda AG, a German company that manufactures computer memory chips
Memory refresh, reading and writing to the same area of computer memory