wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory hierarchy

profile
Kush Patel
Jul 05, 2024
0 Likes
0 Discussions
82 Reads

Main memory, alternatively RAM (Random Access Memory), is a cache that is following. Though slower, it is significantly larger than both cache and registers. It acts as an expanded storage space for the current data and active processes. Ram has a quick reading and writing speed than the secondary memory because it is volatile meaning it loses stored information when power goes off.

Secondary storage implies disks (e.g., hard disk drives (HDDs) or solid-state drives (SSDs)) such as HDDs and SSDs. These devices are non-volatile; they retain data even after power has been switched off while costing less per bit of information saved compared to RAM in terms of capacity. They are however much slower which makes them not very useful for direct data retrieval by the CPU during active tasks. Secondary storage is best suited to long-term storage for operating systems, applications, and large files.

The principle of memory hierarchy constitutes the central element of computer architecture and is grounded on the length of processing, size, and costs. There are strategies of using this hierarchy in a most effective way, such as data caching, memory management, and the application of algorithms that help the computer to go to the necessary memory layers faster that include the CPU cache and then main memory. With the help of additional memory chips, so-called cache that holds frequently accessed data, it will become possible for the computer to offload secondary data from vast yet inexpensive storage unit to a slower one and so can it ensure both high speeding retrieval of data and high data-handling functionality.

Ensuring a well-organized memory hierarchy is a fundamental key to system architects, developers, and engineers who are striving to make the computational operations more efficient and overall system performance more effective.

Div:A

Kush Patel 

53003230107


Comments ()


Sign in

Read Next

E-BUSINESS RISK MANAGEMENT

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Ethical Hacking

Blog banner

memory management

Blog banner

TRIGGERS IN DATABASE

Blog banner

The Golden Temple , Amritsar

Blog banner

From Model Mistakes to Metrics

Blog banner

undefined

Blog banner

My Favorite Sportsperson

Blog banner

RAID

Blog banner

Data Warehouse Bus Matrix

Blog banner

Concurrency and memory

Blog banner

Social Engineering

Blog banner

Street foods

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Modern operating system

Blog banner

Women empowerment

Blog banner

Indian Culture and Tradition

Blog banner

Blog name

Blog banner

Memory input output management

Blog banner

LINUX

Blog banner

Disk Management

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Cyber Forensic in the Banking sector

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

GOOGLE

Blog banner

Deadlock

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Operating Systems

Blog banner

Subnet Masking

Blog banner

Evolution of Operating system

Blog banner

Microsoft powerpoint presentation

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

URL vs Domain

Blog banner

Deadlock and Starvation

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Memory management

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Deadlock

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner