wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory hierarchy

profile
Kush Patel
Jul 05, 2024
0 Likes
0 Discussions
82 Reads

Main memory, alternatively RAM (Random Access Memory), is a cache that is following. Though slower, it is significantly larger than both cache and registers. It acts as an expanded storage space for the current data and active processes. Ram has a quick reading and writing speed than the secondary memory because it is volatile meaning it loses stored information when power goes off.

Secondary storage implies disks (e.g., hard disk drives (HDDs) or solid-state drives (SSDs)) such as HDDs and SSDs. These devices are non-volatile; they retain data even after power has been switched off while costing less per bit of information saved compared to RAM in terms of capacity. They are however much slower which makes them not very useful for direct data retrieval by the CPU during active tasks. Secondary storage is best suited to long-term storage for operating systems, applications, and large files.

The principle of memory hierarchy constitutes the central element of computer architecture and is grounded on the length of processing, size, and costs. There are strategies of using this hierarchy in a most effective way, such as data caching, memory management, and the application of algorithms that help the computer to go to the necessary memory layers faster that include the CPU cache and then main memory. With the help of additional memory chips, so-called cache that holds frequently accessed data, it will become possible for the computer to offload secondary data from vast yet inexpensive storage unit to a slower one and so can it ensure both high speeding retrieval of data and high data-handling functionality.

Ensuring a well-organized memory hierarchy is a fundamental key to system architects, developers, and engineers who are striving to make the computational operations more efficient and overall system performance more effective.

Div:A

Kush Patel 

53003230107


Comments ()


Sign in

Read Next

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Depression

Blog banner

What is HTML?

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Assignment 2

Blog banner

Development Of Modern Operating System

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

NETWORK SECURITY RISKS

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Privacy in Social Media and Online Services

Blog banner

WORKFRONT SOFTWARE

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Cyber Security in Data Breaching

Blog banner

Operating system

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

FIREWALL

Blog banner

Memory Management

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Memory input output management

Blog banner

Emerging threats in cyber Forensics

Blog banner

Cache memory

Blog banner

Service transition principles

Blog banner

Big Data Architecture

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Security and E-mail

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

What are Tenders its various types

Blog banner

Operating System

Blog banner

Importance of Website

Blog banner

Child labour

Blog banner

Deadlock

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Memory Hierarchy

Blog banner

Types of Malware in Cyber Security

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Service Catalogue Management

Blog banner