wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

15 Websites that will make your life easier ...!!!

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Cyber Security in Data Breaching

Blog banner

Linux Threads:

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

DNS Cache

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Processes: Process Description and Control.

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Virtual Machine

Blog banner

Fault Tolerance in an Operating System

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

URL vs Domain

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

"Audit" In Data Science

Blog banner

Mumbai Metro 3

Blog banner

Inventory management software system

Blog banner

Financial Fraud Detection

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Modern Operating System

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Memory

Blog banner

Vikrant’s first blog

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Big O Notation

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Operating Systems Overview

Blog banner

Google classroom

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Memory Management

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

The Right way of cooking

Blog banner

Types of Viruses

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Modern Operating System

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner