wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Chirag Varu
Jul 04, 2024
0 Likes
0 Discussions
81 Reads

What is Memory Management?

Memory management refers to the system of controlling and coordinating laptop memory, assigning blocks to numerous running packages to optimize usual device overall performance. It guarantees that each technique has enough reminiscence to execute and that the system runs successfully.


Features :

Process Isolation:

  • The running system (OS) ought to make sure that each program walking on a laptop doesn’t interfere with some other program's information or commands.
    Example: Imagine you are running a web browser and a phrase processor on the equal time. The OS makes positive that the internet browser can not trade the record you are writing in the word processor and vice versa

Automatic Allocation and Management:

  • The OS mechanically manages and allocates reminiscence to applications as needed with out bothering the programmer about reminiscence limitations.
    Example: When you open a couple of applications, like a song participant and a sport, the OS allocates memory to each utility dynamically with a purpose to run easily with out you having to manipulate the memory manually.

Support of Modular Programming:

  • Programmers can create software elements (modules), and they are able to effortlessly add, do away with, or resize these components even as this system is strolling.
    Example: If you are growing a software program utility and also you want to feature a brand new function or dispose of an vintage one, you could accomplish that dynamically with out preventing the complete software.

Protection and Access Control:

  • The OS guarantees that while reminiscence can be shared between programs whilst wanted, it also protects applications from unauthorized get entry to to their memory.
    Example: If your laptop has consumer accounts for one of a kind family individuals, the OS guarantees that one family member’s packages and statistics are blanketed from get right of entry to with the aid of some other member of the family until sharing is explicitly allowed.

Long-term Storage:

  • Some applications need to save statistics even if the pc is grew to become off, and the OS provides methods to store this records permanently.
    Example: When you store a report in your word processor, the file is saved to your tough drive or SSD so that you can get admission to it once more even once you restart your computer.

 

Div - A

Chirag varu
Sap ID: 53003230110


Comments ()


Sign in

Read Next

IO Buffers

Blog banner

Critical success factors

Blog banner

Stop Racism

Blog banner

EID UL FITR

Blog banner

Pandas Matrix Applications

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Hypothesis Testing in Data Science

Blog banner

Security Issues

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

What is HTML?

Blog banner

Goa Trip With Friends

Blog banner

Cryptanalysis tool

Blog banner

Multicore CPUs

Blog banner

Deadlock and Starvation

Blog banner

semaphores in os

Blog banner

Functions of Operating System

Blog banner

Traveling

Blog banner

Cross site scripting Attack

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

evolution of operating system - Disha Parekh

Blog banner

note taker app

Blog banner

Operating system

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Explaining Buffer Overflow with Example

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

History of Money

Blog banner

File System

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Zomato (Income Sources)

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

File system

Blog banner

Models of Information Security.

Blog banner

SPAM

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

MACHINE LEARNING

Blog banner

Broken Authentication Attacks

Blog banner

Deadlock

Blog banner