wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The Memory Hierarchy

profile
Kirtana Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
44 Reads

Memory hierarchy is the hierarchy of memory and storage devices found in a computer system.It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

Let us discuss each level of memory hierarchy in detail:

Level-0 − Registers

The registers are present inside the CPU. As they are present inside the CPU, they have least access time. Registers are most expensive and smallest in size generally in kilobytes. They are implemented by using Flip-Flops.

Level-1 − Cache

Cache memory is used to store the segments of a program that are frequently accessed by the processor. It is expensive and smaller in size generally in Megabytes and is implemented by using static RAM.

Level-2 − Primary or Main Memory

It directly communicates with the CPU and with auxiliary memory devices through an I/O processor. Main memory is less expensive than cache memory and larger in size generally in Gigabytes. This memory is implemented by using dynamic RAM.

Level-3 − Secondary storage

Secondary storage devices like Magnetic Disk are present at level 3. They are used as backup storage. They are cheaper than main memory and larger in size generally in a few TB.

Level-4 − Tertiary storage

Tertiary storage devices like magnetic tape are present at level 4. They are used to store removable files and are the cheapest and largest in size (1-20 TB).


Comments ()


Sign in

Read Next

BENIFITS OF YOGA

Blog banner

Deming’s Process

Blog banner

Types Of scheduling

Blog banner

Dal Bafla Recipe

Blog banner

Define Instagram.

Blog banner

Social Engineering Attacks

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Optimization of operating system design

Blog banner

Instagram

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Worms, viruses and Bots

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Process Creation

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Measuring IT Risk

Blog banner

Virtual memory

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

What is metaverse?

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

NETSUITE

Blog banner

Virtual Machine

Blog banner

"Games and the future"

Blog banner

Deadlock

Blog banner

Interrupts in operating system.

Blog banner

File system

Blog banner

Direct Memory Access

Blog banner

Rain bow

Blog banner

Development Of Modern Operating System

Blog banner

Impact of social media on the human life

Blog banner

The Laws of Karma

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Software

Blog banner

E-commerce

Blog banner

VPN

Blog banner

Advantage of freedom

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

The Right way of cooking

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner