wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

Jio .....A Revolution ?? ??

Blog banner

Outlook.com

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Direct Memory Access

Blog banner

Webmail

Blog banner

Scheduling

Blog banner

Fitness regime by Deepesh

Blog banner

Os assignment

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Virtual Memory

Blog banner

ODOO

Blog banner

Mobile Security

Blog banner

Rapido

Blog banner

UniProcessor Scheduling

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Scala - a programming tool

Blog banner

PHISHING

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Deadlock

Blog banner

Assignment 2

Blog banner

Direct Memory Access

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Photorec - media recovery tool

Blog banner

Having passion in life

Blog banner

Firewall

Blog banner

Understanding - Proof of Work!

Blog banner

Social Engineering Attacks

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Twisted world

Blog banner

Deadlock and Starvation

Blog banner

Types of Hackers.

Blog banner

HACKING MOBILE PLATFORM

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Understanding Mobile Device Forensics

Blog banner

"Mahakali cave"

Blog banner

Clustering Techniques

Blog banner

Rain

Blog banner

RACI model in IT services

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

How to lose belly fat

Blog banner

Platonic Solids

Blog banner