wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Hierarchy

profile
Heer Bhatt
Jul 04, 2024
0 Likes
0 Discussions
101 Reads

In Computer System, Memory hierarchy is a way to organize different type of memory (eg cache,RAM,hard drive) to reduce the time it takes to access data. It is one of the most required thing in computer memory, as it will help in optimizing memory available in computer. There aee multiple levels in memory hierarchy, understanding the memory hierarchy in computer architecture involves memory, USB, hard disk and tape drives.Each having different size,access time,speed etc. Memory like cache and main memory are the faster as compared to other type of memory. CPU cost varies with regusters being the cheapest and tape drives being the most expensive. Access time increases as you move from registers to cache, main memory, USB,hard disk and tape drives. As access time increases speed decreases and cost rises. Each level serves a different purpose in storing and accessing data. Size and access time are crucial factors in memory hierarchy.The frequency of access varies across memory level, with registers being the most frequently accessed due to their direct connection with CPU.

1. Registers

Registers are small, high-speed memory units located in the CPU. They are used to store the most frequently used data and instructions.

2. Cache Memory

Cache memory is a small, fast memory unit located close to the CPU. It stores frequently used data and instructions that have been recently accessed from the main memory.

3. Main Memory

Main memory, also known as RAM (Random Access Memory), is the primary memory of a computer system. It has a larger storage capacity than cache memory, but it is slower.

4. Secondary Storage

Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD), is a non-volatile memory unit that has a larger storage capacity than main memory. It is used to store data and instructions that are not currently in use by the CPU.

5. Magnetic Disk

Magnetic Disks are simply circular plates that are fabricated with either a metal or a plastic or a magnetized material.

6. Magnetic Tape

Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. It is generally used for the backup of data.


Comments ()


Sign in

Read Next

What is Packet Filtering?

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Benefits and drawback of web security.

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Domain Name System

Blog banner

Data Science in Mental Health Prediction

Blog banner

Beatbox

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

The functions of operating system

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

INTERNET SECURITY

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Satellite Based Positioning

Blog banner

memory cache

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Deadlock

Blog banner

INTERRUPTS

Blog banner

INTERNET SECURITY

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

Diwali

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Microsoft Windows Overview

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Race condition

Blog banner

Importance of self defence for girls

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

WORKFRONT SOFTWARE

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

ASANA- A Management System.

Blog banner

File management

Blog banner

Business-to-Business

Blog banner

My favourite food

Blog banner

TRAIN TRAVELING

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

ADIDAS

Blog banner