wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Different types of scam frauds

Blog banner

Data Visualization in Decision-Making

Blog banner

MUTUAL EXCLUSION

Blog banner

Number Guessing game --lisp

Blog banner

Health and fitness in technology

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

How Men and Women Process Pain Differently

Blog banner

Benefits of Yoga

Blog banner

Buffers in Operating Systems

Blog banner

Starvation

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Street foods

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Security issues

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Cyber Forensic in the Banking sector

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Direct Memory Access

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Some facts about Technology

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Modern OS

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

semaphores in os

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Dr. Venkadavarahan

Blog banner

STARVATION

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

RAID - LEVELS OF RAID

Blog banner

"Life as a Part-time Student"

Blog banner

geographic information system (GIS)

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Man is free by the birth .

Blog banner

Models of Information Security.

Blog banner

The Features of Blockchain

Blog banner

Uniprocessor Scheduling

Blog banner