wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Hierarchy

profile
Heer Bhatt
Jul 04, 2024
0 Likes
0 Discussions
102 Reads

In Computer System, Memory hierarchy is a way to organize different type of memory (eg cache,RAM,hard drive) to reduce the time it takes to access data. It is one of the most required thing in computer memory, as it will help in optimizing memory available in computer. There aee multiple levels in memory hierarchy, understanding the memory hierarchy in computer architecture involves memory, USB, hard disk and tape drives.Each having different size,access time,speed etc. Memory like cache and main memory are the faster as compared to other type of memory. CPU cost varies with regusters being the cheapest and tape drives being the most expensive. Access time increases as you move from registers to cache, main memory, USB,hard disk and tape drives. As access time increases speed decreases and cost rises. Each level serves a different purpose in storing and accessing data. Size and access time are crucial factors in memory hierarchy.The frequency of access varies across memory level, with registers being the most frequently accessed due to their direct connection with CPU.

1. Registers

Registers are small, high-speed memory units located in the CPU. They are used to store the most frequently used data and instructions.

2. Cache Memory

Cache memory is a small, fast memory unit located close to the CPU. It stores frequently used data and instructions that have been recently accessed from the main memory.

3. Main Memory

Main memory, also known as RAM (Random Access Memory), is the primary memory of a computer system. It has a larger storage capacity than cache memory, but it is slower.

4. Secondary Storage

Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD), is a non-volatile memory unit that has a larger storage capacity than main memory. It is used to store data and instructions that are not currently in use by the CPU.

5. Magnetic Disk

Magnetic Disks are simply circular plates that are fabricated with either a metal or a plastic or a magnetized material.

6. Magnetic Tape

Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. It is generally used for the backup of data.


Comments ()


Sign in

Read Next

How to make Pancakes

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Virtual Memory

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Landslide Hazard

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

File Allocation Methods

Blog banner

PERSONAL STORIES

Blog banner

INTRODUCTION TO C#

Blog banner

Music

Blog banner

Buffer overflow

Blog banner

computer security

Blog banner

Service transistion under difficult conditions

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Data Visualization in Decision-Making

Blog banner

The seven-step improvement process

Blog banner

What is Spyware? and examples of them.

Blog banner

Indian Culture and Tradition

Blog banner

Sage business cloud accounting

Blog banner

Memory Management of Operating System(OS)

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

FASHION

Blog banner

Threads

Blog banner

Indian Food

Blog banner

AI and cyber Security

Blog banner

Disk scheduling

Blog banner

Ola

Blog banner

E-Cash (Electronic Cash)

Blog banner

Memory Management

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Memory Management in Operating System

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Dancing Classes In Mumbai

Blog banner

Evolution of Operating system

Blog banner

Memory Management

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Security issues

Blog banner

Data carving - using hex editor

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner