wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

What is process

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

The Right way of cooking

Blog banner

Fashion design

Blog banner

Photorec - media recovery tool

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

therapist blog

Blog banner

DISK SCHEDULING

Blog banner

Animal’s have my heart

Blog banner

OS Assignment 1

Blog banner

SESSION HIJACKING

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Indian Culture and Tradition

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

MAILFENCE

Blog banner

Linux Threads:

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Virtual Machine

Blog banner

A Short History of GIS

Blog banner

Capacity management in ITSM

Blog banner

Stop Racism

Blog banner

SQL Injection practice on DVWA

Blog banner

Making Money through Instagram

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Microsoft Word

Blog banner

Deadlock and starvation in operating system

Blog banner

Cyber Security in Data Breaching

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

HTML vs HTML5

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Deadlock

Blog banner

Full Disk Encryption

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

undefined

Blog banner

Jira Software

Blog banner

Microsoft Windows Overview

Blog banner

Deadlock and Starvation

Blog banner

GIS REMOTE SENSING

Blog banner