wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Jul 05, 2024
0 Likes
0 Discussions
65 Reads

TOPIC : MEMORY MANAGEMENT

As the word itself states, we are talking about managing the memory on the computer logically and not physically.

 

In the context of OS, the operating system involves the process of managing computer memory by making various decisions and concepts. 

The below key points highlight the memory management process, benefits and usages.

• Allocation & Deallocation: The OS has the role of allocating memory as per requirement and whenever not required the memory should be free or should get deallocated. So that the usage of storage resources are done at maximum level ( pura ache se memory use hoga without wastage of storage).

 

• Memory Protection: The allocated memory is protected and would not be allocated(kisi aur user ko wohi memory allocate nahi hogi) to any other user until the user wishes to  overwrite the memory. As well as it also take care of that data( leak nahi hota).

 

• Process Isolation: mein sab process independent hoti hai taaki koi ek bhi fail ho toh dusre par affect naa ho aur sab continuous manner mein kaam chalta rahe.

 

•Cache Management: Operating system cache memory ko manage karne ka kaam karta hai jisse ki, kaam karne ki speed badh jaati hai, aur current access data store ho sake jo background mein use ho rha hoga.

 

Effective memory management bohot helpful better speednof execution and best use of storage resources ke liye!

 

The below example of running multiple applications at same time helps to explain the concept of memory management:

 

Imagine ke hamare pass 4gb ram ka computer aur ham ek sath background mein bohot sara apps chala rahe hai.

-Typing words document 

-Playing music

-Web browser for searching information 

Etc.. simultaneously chal raha hai


Comments ()


Sign in

Read Next

Why is online marketing is important in current scenario

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Evolution of operating systems

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Data is an asset and it is your responsibility!

Blog banner

CoWIN

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Guidelines for a low sodium diet.

Blog banner

I/O Buffering

Blog banner

Electronic Funds Transfer

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

A True Friendship

Blog banner

Fault Tolerance

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

File system implementation

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Email Privacy

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Process Description

Blog banner

Earth with no trees

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

The seven-step improvement process

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Evolution of Operating System

Blog banner

My Favorite Sportsperson

Blog banner

Expert System In AI

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

What are Virtual Machines

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

undefined

Blog banner

Data Lake

Blog banner

Cycling

Blog banner

Threads

Blog banner

Computer Security

Blog banner

OS ASSIGNMENT

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner