wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

10 Reasons to Date a South Indian Girl

Blog banner

Trello ( management software)

Blog banner

Service Strategy In ITSM

Blog banner

Computer Security

Blog banner

RAID and It's Levels

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Topic: Sessions in Operating system

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Senseless Teeths

Blog banner

Data is an asset and it is your responsibility!

Blog banner

E-learning

Blog banner

Evolution of Operating System

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Define Instagram.

Blog banner

Sessions In OS.

Blog banner

Cloud Security: Trends and Innovations

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Data Science & AI

Blog banner

Deadlocks

Blog banner

Smartsheet

Blog banner

RAID - LEVELS OF RAID

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Cyber Security in Data Breaching

Blog banner

E-mail security

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Virtual memory

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Linux

Blog banner

IoT Architecture Based Security

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

I/O Buffering

Blog banner

Hacking

Blog banner

Making Money through Instagram

Blog banner

Why we should do reading

Blog banner

Memory Management in Operating System

Blog banner

GraphX:- A graph processing tool

Blog banner