wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Chirag Varu
Jul 04, 2024
0 Likes
0 Discussions
81 Reads

What is Memory Management?

Memory management refers to the system of controlling and coordinating laptop memory, assigning blocks to numerous running packages to optimize usual device overall performance. It guarantees that each technique has enough reminiscence to execute and that the system runs successfully.


Features :

Process Isolation:

  • The running system (OS) ought to make sure that each program walking on a laptop doesn’t interfere with some other program's information or commands.
    Example: Imagine you are running a web browser and a phrase processor on the equal time. The OS makes positive that the internet browser can not trade the record you are writing in the word processor and vice versa

Automatic Allocation and Management:

  • The OS mechanically manages and allocates reminiscence to applications as needed with out bothering the programmer about reminiscence limitations.
    Example: When you open a couple of applications, like a song participant and a sport, the OS allocates memory to each utility dynamically with a purpose to run easily with out you having to manipulate the memory manually.

Support of Modular Programming:

  • Programmers can create software elements (modules), and they are able to effortlessly add, do away with, or resize these components even as this system is strolling.
    Example: If you are growing a software program utility and also you want to feature a brand new function or dispose of an vintage one, you could accomplish that dynamically with out preventing the complete software.

Protection and Access Control:

  • The OS guarantees that while reminiscence can be shared between programs whilst wanted, it also protects applications from unauthorized get entry to to their memory.
    Example: If your laptop has consumer accounts for one of a kind family individuals, the OS guarantees that one family member’s packages and statistics are blanketed from get right of entry to with the aid of some other member of the family until sharing is explicitly allowed.

Long-term Storage:

  • Some applications need to save statistics even if the pc is grew to become off, and the OS provides methods to store this records permanently.
    Example: When you store a report in your word processor, the file is saved to your tough drive or SSD so that you can get admission to it once more even once you restart your computer.

 

Div - A

Chirag varu
Sap ID: 53003230110


Comments ()


Sign in

Read Next

What is Vishing?

Blog banner

The launch of UniMap by HERE

Blog banner

MEMORY MANAGEMENT

Blog banner

File Management system

Blog banner

Operating system

Blog banner

Is Your Password Complex Enough?

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Memory hierarchy

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Internet of Things

Blog banner

Intrusion Detection System

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Modern Operating System

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Worms, viruses and Bots

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Online Games

Blog banner

Steganography and Steganalysis

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

A True Friendship

Blog banner

Scheduling in Operating Systems

Blog banner

Deadlock

Blog banner

John Titor: The Time Traveler

Blog banner

Security Issues and Countermeasures

Blog banner

All you need to know about Cassandra

Blog banner

What is a Dumpster Diving Attack?

Blog banner

BrainGate Technology

Blog banner

What are Virtual Machines

Blog banner

I Personally

Blog banner

Cache Memory

Blog banner

Service Operations in ITSM

Blog banner

Social engineering in cyber security

Blog banner

Esri India launches Policy Maps.

Blog banner

Artical on FreshBooks

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Paralysis/Paralysis Stroke

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Data Mapping

Blog banner

Understanding Regression Analysis

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Password Generator - Lisp

Blog banner

Understanding Mobile Device Forensics

Blog banner