wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

The Secure Software Development Life Cycle (SDLC)

Blog banner

objectives and function of operating system

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

A book review

Blog banner

Disk Management

Blog banner

Data Warehouse Bus Matrix

Blog banner

Types of Malware in Cyber Security

Blog banner

Emailing the merger document

Blog banner

Top 10 Logos and their meanings

Blog banner

Modern operating system

Blog banner

Chicken Dum Biryani

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Types of Hackers

Blog banner

Developments in Modern Operating Systems

Blog banner

Computer Security

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Artificial Intelligence and I

Blog banner

Threads

Blog banner

Disk cache

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Data Mining

Blog banner

Memory Management Techniques

Blog banner

1.1 basic elements

Blog banner

A Heartfelt Act of Kindness

Blog banner

Virtual Machine

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Mumbaicha Dabbawalla

Blog banner

Define Instagram.

Blog banner

Virtual Machine

Blog banner

What is OS Fingerprinting?

Blog banner

Virtual memory

Blog banner

Multithreading in Operating System

Blog banner

Virtual Memory

Blog banner

Models of Information Security.

Blog banner

15 Interesting Facts about India

Blog banner

Wedding photographer

Blog banner

Cache memory

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Kernel in Operating System

Blog banner