Addressability of memory - computer architecture, Computer Engineering

Addressability:

Location-addressable

Each alone accessible unit of information in storage is chosen with its numerical memory address. In the modern computers, location-addressable storage generally restrict to primary storage that accessed internally by computer programs, because location-addressability is very efficient, but onerous for humans.

File addressable

Information is divided into files of variable length, and a particular file is chosen with human-readable file names and directory. The underlying device is yet location-addressable, but the OS of a computer system provides the file system abstraction to make the operation more clear. In modern computers tertiary, secondary and off-line storage use file systems.

Content-addressable

Individually accessible unit of information is chosen based on the basis of (part of) the contents stored there. Content-addressable storage may be implemented by using hardware (computer device), software (computer program) with hardware being faster but more expensive option. Hardware content addressable memory is frequently used in a computer's CPU cache.

 

Posted Date: 10/13/2012 6:09:47 AM | Location : United States







Related Discussions:- Addressability of memory - computer architecture, Assignment Help, Ask Question on Addressability of memory - computer architecture, Get Answer, Expert's Help, Addressability of memory - computer architecture Discussions

Write discussion on Addressability of memory - computer architecture
Your posts are moderated
Related Questions
How free-space is managed using bit vector implementation? The free-space list is executed as a bit map or bit vector. Each block is shown by 1 bit. If the block is free, the b

What is booting? When the power is turned on, the OS has to be loaded into the main memory which is taken place as part of a process known as booting. To initiate booting a tin

Define parity bit and List its types. The most common error detection code used is the parity bit. Parity bit is a extra bit contained with a binary message to make the total n

Here are some common development milestones that  you should aim for: 1. Send a packet over. Send an acknowledgement back. 2. Have checksum algorithm executed 3. Ability t

Explain briefly about GNOME desktop

Q. Perform binary subtraction, using 1s & 2s complement: 1) 1010-1011 2) 0.1111-0.101 3) 11.11-10.111 Q.  (192.25)10 - (C0.C)16 = (x)7 Find values of x, using 7's compl

Given a cell, we must determine its neighbouring cells i.e. those with which it shares a wall. The cells with an x are the neighbours of the cell c. Write the function getneighbour

Takes care structural and behavioural aspect of a software system. Contains software usage, functionality, performance, economic, reuse, and technology constraints.

Q. Illustrate Decimal Fixed Point Representation? The point of this representation is to keep the number in decimal equivalent form and not binary as above. A decimal digit is

What is the purpose of guard bits used in floating point operations? The guard bits are the extra bits which are used to retain the in-between steps to enhance the accuracy in