wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Jul 05, 2024
0 Likes
0 Discussions
65 Reads

TOPIC : MEMORY MANAGEMENT

As the word itself states, we are talking about managing the memory on the computer logically and not physically.

 

In the context of OS, the operating system involves the process of managing computer memory by making various decisions and concepts. 

The below key points highlight the memory management process, benefits and usages.

• Allocation & Deallocation: The OS has the role of allocating memory as per requirement and whenever not required the memory should be free or should get deallocated. So that the usage of storage resources are done at maximum level ( pura ache se memory use hoga without wastage of storage).

 

• Memory Protection: The allocated memory is protected and would not be allocated(kisi aur user ko wohi memory allocate nahi hogi) to any other user until the user wishes to  overwrite the memory. As well as it also take care of that data( leak nahi hota).

 

• Process Isolation: mein sab process independent hoti hai taaki koi ek bhi fail ho toh dusre par affect naa ho aur sab continuous manner mein kaam chalta rahe.

 

•Cache Management: Operating system cache memory ko manage karne ka kaam karta hai jisse ki, kaam karne ki speed badh jaati hai, aur current access data store ho sake jo background mein use ho rha hoga.

 

Effective memory management bohot helpful better speednof execution and best use of storage resources ke liye!

 

The below example of running multiple applications at same time helps to explain the concept of memory management:

 

Imagine ke hamare pass 4gb ram ka computer aur ham ek sath background mein bohot sara apps chala rahe hai.

-Typing words document 

-Playing music

-Web browser for searching information 

Etc.. simultaneously chal raha hai


Comments ()


Sign in

Read Next

Process State

Blog banner

What is Minting & Mining

Blog banner

Microsoft Windows Overview

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

virtual machine

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Latest Email Marketing Techniques

Blog banner

Modern Operating Systems.

Blog banner

Emerging threats in cyber Forensics

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Satellite Based Positioning

Blog banner

Why we fail after giving 100% ?

Blog banner

Instagram

Blog banner

OS- Assignnment 1

Blog banner

Linux 94

Blog banner

Cyber Security in Data Breaching

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

K-means use cases

Blog banner

Python as a tool for Data science task & project

Blog banner

Traditional UNIX Scheduling

Blog banner

Uniprocessor Scheduling

Blog banner

Virtual Memory

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Corporate Discipline.

Blog banner

Direct Memory Access

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Deadlock

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

BharatPe

Blog banner

Types of Big Data

Blog banner

Why Data Security Is Important

Blog banner

Zomato (Income Sources)

Blog banner

What are Tenders its various types

Blog banner

Predicting Student Performance with Data Science

Blog banner

Virtual Memory

Blog banner

(Input/Output) in os

Blog banner

Use case of K-means clustering

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

computer security

Blog banner

Modern operating system

Blog banner

E-security systems | CCTV

Blog banner

Importance of modern technology era

Blog banner