wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Jul 05, 2024
0 Likes
0 Discussions
65 Reads

TOPIC : MEMORY MANAGEMENT

As the word itself states, we are talking about managing the memory on the computer logically and not physically.

 

In the context of OS, the operating system involves the process of managing computer memory by making various decisions and concepts. 

The below key points highlight the memory management process, benefits and usages.

• Allocation & Deallocation: The OS has the role of allocating memory as per requirement and whenever not required the memory should be free or should get deallocated. So that the usage of storage resources are done at maximum level ( pura ache se memory use hoga without wastage of storage).

 

• Memory Protection: The allocated memory is protected and would not be allocated(kisi aur user ko wohi memory allocate nahi hogi) to any other user until the user wishes to  overwrite the memory. As well as it also take care of that data( leak nahi hota).

 

• Process Isolation: mein sab process independent hoti hai taaki koi ek bhi fail ho toh dusre par affect naa ho aur sab continuous manner mein kaam chalta rahe.

 

•Cache Management: Operating system cache memory ko manage karne ka kaam karta hai jisse ki, kaam karne ki speed badh jaati hai, aur current access data store ho sake jo background mein use ho rha hoga.

 

Effective memory management bohot helpful better speednof execution and best use of storage resources ke liye!

 

The below example of running multiple applications at same time helps to explain the concept of memory management:

 

Imagine ke hamare pass 4gb ram ka computer aur ham ek sath background mein bohot sara apps chala rahe hai.

-Typing words document 

-Playing music

-Web browser for searching information 

Etc.. simultaneously chal raha hai


Comments ()


Sign in

Read Next

Riddhi Miyani 53003220140

Blog banner

Proton mail

Blog banner

Virtual Memory

Blog banner

RAID

Blog banner

All you need to know about Cassandra

Blog banner

Types of email

Blog banner

The Role of cryptography in cyber security

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Life of a 2020-2021 student

Blog banner

TRELLO

Blog banner

My First Dream Bike

Blog banner

Memory management

Blog banner

Satellite Based Positioning

Blog banner

Blockchain

Blog banner

TRAIN TRAVELING

Blog banner

Art and Culture of Rajasthan

Blog banner

UniProcessor Scheduling

Blog banner

Virtual machine

Blog banner

Electronic data interchange

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Process State

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

FASHION

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Memory Management

Blog banner

Theads

Blog banner

Scheduling in Operating Systems

Blog banner

Strengthening Active Directory Security

Blog banner

How to kiss

Blog banner

Memory Management

Blog banner

Raid

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Busted : Common Web Security Myths

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

INTERNET

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Constrains in service design

Blog banner

Malicious softwares

Blog banner