wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

How Men and Women Process Pain Differently

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Session Vulnerabilities

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Some web vulnerabilities

Blog banner

Firewall in Computer Network

Blog banner

Deadlock and starvation

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

What is M-commerce and how it's work

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Virtual memory

Blog banner

Google classroom

Blog banner

Types of Hackers

Blog banner

Deadlock and Starvation

Blog banner

12 Principles of Animation

Blog banner

Network Forensics

Blog banner

10 Types of Friends in every friend group

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Lucidchart

Blog banner

Fitness regime by Deepesh

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

GraphX:- A graph processing tool

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Article on Team Work

Blog banner

Music is life

Blog banner

Senseless Teeths

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Remote Work in 2026

Blog banner

Vulnerability Assessment

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Multiprocessor scheduling

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Social Engineering

Blog banner

Modern Operating System

Blog banner

Web Site

Blog banner

Mumbaicha Dabbawalla

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Dr. Venkadavarahan

Blog banner

IO Buffers

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner