Addressability of memory - computer architecture, Computer Engineering

Addressability:

Location-addressable

Each alone accessible unit of information in storage is chosen with its numerical memory address. In the modern computers, location-addressable storage generally restrict to primary storage that accessed internally by computer programs, because location-addressability is very efficient, but onerous for humans.

File addressable

Information is divided into files of variable length, and a particular file is chosen with human-readable file names and directory. The underlying device is yet location-addressable, but the OS of a computer system provides the file system abstraction to make the operation more clear. In modern computers tertiary, secondary and off-line storage use file systems.

Content-addressable

Individually accessible unit of information is chosen based on the basis of (part of) the contents stored there. Content-addressable storage may be implemented by using hardware (computer device), software (computer program) with hardware being faster but more expensive option. Hardware content addressable memory is frequently used in a computer's CPU cache.

 

Posted Date: 10/13/2012 6:09:47 AM | Location : United States







Related Discussions:- Addressability of memory - computer architecture, Assignment Help, Ask Question on Addressability of memory - computer architecture, Get Answer, Expert's Help, Addressability of memory - computer architecture Discussions

Write discussion on Addressability of memory - computer architecture
Your posts are moderated
Related Questions
In a particular exchange during busy hour 1200 calls were offered to a group of trunks, during this time 6 calls were lost. The average call duration being 3 minutes Calculate

Translate the following sentences into predicate logic, using Russell's theory of definite descriptions to represent the article the. a. The wizzard of Oz fell. b. Everyone a

Why should project managers complete hard problems first in an OOSAD project?   Ans) The query really holds good in general for each situation in life. It is one of the prin

What are the two approaches used for generating the control signals in proper sequence? Hardwired control Micro programmed control

Step 1: Click on Edit Step 2: Select reference Step 3: Select Translation Step 4: Click on SSI Step 5: For showing the SSI file; choose one of the following options:

A student counted up the number of statements implemented in a program developed for sorting n integers and came up with a recurrence of the form: T(n) = a * n + b + 2T(n/2), an

What is testing? List its types. Testing ensures that the application is suitable for actual use and that it truthfully satisfies the requirements. Types are: Unit te

What are the events done by the Kernel after a process is being swapped out from the main memory? When Kernel changes the process out of the primary memory, it performs the fol

MX is conceptually easy, yet bears the fruit of years of domain experience and research. In a nutshell, JMX describes a standard means for applications to expose management functio

Take a look at the code and try to understand the logic, particularly, the way scrambled words are disambiguated, i.e.., whether they are matched successfully against a correct wor