2.MEMORY IN OPERATING SYSTEM


2. Memory ● The top layer consists of the registers internal to the CPU.
● The storage capacity available in them is typically 32 × 32 bits on a 32-bit CPU and 64 × 64 bits on a 64-bit CPU. Less than 1 KB in both cases.
● Programs must manage the registers (i.e., decide what to keep in them) themselves, in software.
● Next comes the cache memory, which is mostly controlled by the hardware.
● Main memory is divided up into cache lines, typically 64 bytes, with addresses 0 to 63 in cache line 0, 64 to 127 in cache line 1, and so on.
● Cache memory is limited in size due to its high cost. Caching plays a major role in many areas of computer science, not just caching lines of RAM. Whenever a resource can be divided into pieces, some of which are used much more heavily than others, caching is often used to improve performance.
● Main memory comes next in the hierarchy of Fig. This is the workhorse of the memory system. Main memory is usually called RAM (Random Access Memory). Old-timers sometimes call it core memory.


● ROM (Read Only Memory) is programmed at the factory and cannot be changed afterward. It is fast and inexpensive.
● EEPROM (Electrically Erasable PROM) andflash memory are also nonvolatile, but in contrast to ROM can be erased and rewritten.
● Flash memory is also commonly used as the storage medium in portable electronic devices.
● Complementary Metal Oxide Semiconductor(CMOS), which is volatile. Many computers use CMOS memory to hold the current time and date.

Operating System #PLAYLIST.
#Subscribe the Channel Link :-
IF any Query or Doubt DM on #Instagram :-
@Aj Upgrading ( BANSODE TECH SOLUTION )
LinkedIn Profile
Link for slides, code samples and text version of the video #blogger
#software #linkedin #tech #hardware #video #operatingsystems #management #data #bscit #mumbaiuniv #operatingsystem #characteristics #bansodetechsolution #ajupgrading

Comments

Popular posts from this blog

Load Data From Excel To Grid View in Asp.net C#

Code Analysis | IDE0054 In C# Application

10.5. Identity and Access Management (IAM) in Cloud Computing