wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory managment

profile
Umang Vora
Jul 05, 2024
0 Likes
0 Discussions
2 Reads

Memory management in an operating system (OS) is like a librarian managing books in a library. Here’s how it works in simple terms:

 

1. **Allocation and Deallocation**: Imagine programs as people borrowing books (memory) from the library. The librarian (OS) gives books to people when they need them and takes the books back when they’re done.

 

2. **Memory Protection**: Each person should only read their own books and not mess with someone else’s. The librarian ensures that people don't take or modify each other’s books.

 

3. **Memory Sharing**: Sometimes, several people might need to read the same book. The librarian lets them share it instead of giving out multiple copies, saving space.

 

4. **Virtual Memory Management**: If the library runs out of physical space (RAM), the librarian can use some space in the back storage (hard disk) to keep extra books. This makes the library seem bigger than it really is.

 

5. **Memory Mapping**: The librarian can make some books available quickly by placing them in a special, easy-to-access area. This is useful for frequently used books.

 

6. **Garbage Collection**: Sometimes, people leave books lying around when they’re done. The librarian goes around and picks up these unused books to put them back on the shelves, making room for others.

 

Overall, memory management ensures that programs run smoothly by efficiently handling the computer's memory, much like a well-organized library where everyone can find and use the books they need.


Comments ()


Sign in

Read Next

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Types of threads

Blog banner

Data Mining

Blog banner

Quality check in IT services

Blog banner

Disk cache

Blog banner

Advantage of freedom

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Online Education

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Virtual memory

Blog banner

NETWORK SECURITY RISKS

Blog banner

RAID

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Telegram and it's features

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Virtual memory in Operating System

Blog banner

How to lose belly fat

Blog banner

Synchronization

Blog banner

Memory Management of Operating System(OS)

Blog banner

WomenEmpowerment

Blog banner

Big Data

Blog banner

Raid and levels of raid.

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Time Series Analysis

Blog banner

Memory Management

Blog banner

Synchronization

Blog banner

Kernel in Operating System

Blog banner

GIS info about Bermuda Triangle

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Dangers of Using Public WiFis

Blog banner

Save Girl Child

Blog banner

Smitten Kitchen Keepers

Blog banner

MPL and how its effects?

Blog banner

Is Your Password Complex Enough?

Blog banner

10 Interesting facts you should know!!!

Blog banner

File Allocation Methods

Blog banner

Fashion design

Blog banner

Virtual memory

Blog banner