wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory hierarchy

profile
Kush Patel
Jul 05, 2024
0 Likes
0 Discussions
82 Reads

Main memory, alternatively RAM (Random Access Memory), is a cache that is following. Though slower, it is significantly larger than both cache and registers. It acts as an expanded storage space for the current data and active processes. Ram has a quick reading and writing speed than the secondary memory because it is volatile meaning it loses stored information when power goes off.

Secondary storage implies disks (e.g., hard disk drives (HDDs) or solid-state drives (SSDs)) such as HDDs and SSDs. These devices are non-volatile; they retain data even after power has been switched off while costing less per bit of information saved compared to RAM in terms of capacity. They are however much slower which makes them not very useful for direct data retrieval by the CPU during active tasks. Secondary storage is best suited to long-term storage for operating systems, applications, and large files.

The principle of memory hierarchy constitutes the central element of computer architecture and is grounded on the length of processing, size, and costs. There are strategies of using this hierarchy in a most effective way, such as data caching, memory management, and the application of algorithms that help the computer to go to the necessary memory layers faster that include the CPU cache and then main memory. With the help of additional memory chips, so-called cache that holds frequently accessed data, it will become possible for the computer to offload secondary data from vast yet inexpensive storage unit to a slower one and so can it ensure both high speeding retrieval of data and high data-handling functionality.

Ensuring a well-organized memory hierarchy is a fundamental key to system architects, developers, and engineers who are striving to make the computational operations more efficient and overall system performance more effective.

Div:A

Kush Patel 

53003230107


Comments ()


Sign in

Read Next

Sweet Mango Murabba

Blog banner

Data Lake

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Deadlock

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

AIS & ANN based Malware detection for Android OS - Nupur Bhatt

Blog banner

Mumbai famous street food

Blog banner

MySQL

Blog banner

Women empowerment

Blog banner

DATA WRANGLING

Blog banner

Components of GIS

Blog banner

CRISP-DM Methodology

Blog banner

Broken Authentication Attacks

Blog banner

Satellite Based Positioning

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Multiprocessor and scheduling

Blog banner

Photography

Blog banner

Virtual memory

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

OS Assignment 3

Blog banner

Mental Health

Blog banner

Monday. com App

Blog banner

Process State

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

What is service level Agreement?

Blog banner

S-Tool : Steganography

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Data Warehouse Bus Matrix

Blog banner

Studying ProRat

Blog banner

Firewall

Blog banner

I/O Buffering

Blog banner

Operating Systems

Blog banner

Memory heirachy (Operating system)

Blog banner

internet email and it's applications

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Multiprocessor and Multicore Organization

Blog banner