wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Krishna Parmar
Aug 14, 2024
0 Likes
0 Discussions
35 Reads

The term memory can be defined as a collection of data in a specific format. It is used to store instructions and process data. The memory comprises a large array or group of words or bytes, each with its own location. The primary purpose of a computer system is to execute programs. These programs, along with the information they access, should be in the main memory during execution. The CPU fetches instructions from memory according to the value of the program counter.


To achieve a degree of multiprogramming and proper utilization of memory, memory management is important. Many memory management methods exist, reflecting various approaches, and the effectiveness of each algorithm depends on the situation.


In a multiprogramming computer, the Operating System resides in a part of memory, and the rest is used by multiple processes. The task of subdividing the memory among different processes is called Memory Management. Memory management is a method in the operating system to manage operations between main memory and disk during process execution. The main aim of memory management is to achieve efficient utilization of memory.


Why Memory Management is Required?

Allocate and de-allocate memory before and after process execution.

To keep track of used memory space by processes.

To minimize

fragmentation

issues.

To proper utilization of main memory.

To maintain data integrity while executing of process.


Comments ()


Sign in

Read Next

Understanding - Proof of Work!

Blog banner

OPERATING SYSTEM

Blog banner

Importance of Website

Blog banner

OPERATING SYSTEM

Blog banner

Instagram

Blog banner

Outlook.com

Blog banner

Challenges and risks in service operations

Blog banner

A Heartfelt Act of Kindness

Blog banner

Blog on Smartsheet.

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

GIS Bharat Maps

Blog banner

Retiring ISS

Blog banner

Memory managment

Blog banner

I/O Buffering

Blog banner

Deadlock and Starvation

Blog banner

GUIDE TO GIS

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Google App Engine

Blog banner

Brain wash of social media

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

VIRTUAL MACHINE

Blog banner

Having passion in life

Blog banner

Wrike

Blog banner

Data Lake

Blog banner

Direct Memory Access

Blog banner

10 Interesting facts you should know!!!

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Virtualization

Blog banner

Processing Crime and Incident Scenes

Blog banner

K-means use cases

Blog banner

Virtual machine.

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

EFT

Blog banner

Big Data Architecture

Blog banner

USES OF WHATSAPP

Blog banner

Functions of operating system

Blog banner

Use case of K-means clustering

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Memory management

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

E-mail security

Blog banner

Regression Analysis

Blog banner