Memory hierarchy, Basic Computer Science

Assignment Help:

Memory hierarchy:

There is another type of high speed memory, known as Cache memory, which is used to increase the speed of processing by making current programs and data available to the CPU at a rapid rate. Cache memory is a relatively small, high speed memory that stores the most recent used instructions or data. It acts as a high-speed buffer between main memory and the CPU.The cache memory is placed in between CPU and main memory. Access time is the time it takes a device or program to locate information and make it available to the computer for further processing. Cache memory access time is about 0.5 to 2.5 ns which is much less than that of the main memory. The access time of main memory is about 50-70 ns. Because of its very high cost, the capacity of the cache memory deployed is 2 to 3 percent of that of the main memory. The access time of mass storage devices such as hard disks are measured in milliseconds (ms).   

1611_memory hierarchy.png


Related Discussions:- Memory hierarchy

What is evaluating information system investments, 1. What is Evaluating In...

1. What is Evaluating Information System Investments? 2. Is IS evaluation different to evaluation of other investments? 3. What approaches are used to evaluate IS investments

What are the most common forms of mixing, Question 1 What is the differenc...

Question 1 What is the difference between Variable Bit Rate and Constant Bit Rate? Question 2 Write a note on: Normalization, Reverberation, Noise Reduction, Filters, and

Process control management, Process Control Management:   A  process  ...

Process Control Management:   A  process  is an executing program. It is considered the standard unit of work within a computer system. Every executing program is treated as a

Hill climbing - artificial intelligence , Hill Climbing - artificial intell...

Hill Climbing - artificial intelligence: As we've seen, in some particular problems, searching the search path from primly to goal state is the point of the exercise. In anothe

How to Open a FCB files?, Opening files 0FH function is used to open an F...

Opening files 0FH function is used to open an FCB file the 21H interruption. The element, the name and extension of the file must be initialized previous to opening it. The DX regi

Description of external hardware interruptions, External interruptions are...

External interruptions are produced by peripheral devices, for example keyboards, printers, communication cards, etc. They are also produced by coprocessors. It is not achievable t

What is fragmentation?, Question 1 What is fragmentation? Question ...

Question 1 What is fragmentation? Question 2 Discuss the various service classes defined by integrated services Question 3 What are congestion? .Mention two algori

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Networking.., write advantages and disadvantages of private and public netw...

write advantages and disadvantages of private and public network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd