wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Jul 05, 2024
0 Likes
0 Discussions
65 Reads

TOPIC : MEMORY MANAGEMENT

As the word itself states, we are talking about managing the memory on the computer logically and not physically.

 

In the context of OS, the operating system involves the process of managing computer memory by making various decisions and concepts. 

The below key points highlight the memory management process, benefits and usages.

• Allocation & Deallocation: The OS has the role of allocating memory as per requirement and whenever not required the memory should be free or should get deallocated. So that the usage of storage resources are done at maximum level ( pura ache se memory use hoga without wastage of storage).

 

• Memory Protection: The allocated memory is protected and would not be allocated(kisi aur user ko wohi memory allocate nahi hogi) to any other user until the user wishes to  overwrite the memory. As well as it also take care of that data( leak nahi hota).

 

• Process Isolation: mein sab process independent hoti hai taaki koi ek bhi fail ho toh dusre par affect naa ho aur sab continuous manner mein kaam chalta rahe.

 

•Cache Management: Operating system cache memory ko manage karne ka kaam karta hai jisse ki, kaam karne ki speed badh jaati hai, aur current access data store ho sake jo background mein use ho rha hoga.

 

Effective memory management bohot helpful better speednof execution and best use of storage resources ke liye!

 

The below example of running multiple applications at same time helps to explain the concept of memory management:

 

Imagine ke hamare pass 4gb ram ka computer aur ham ek sath background mein bohot sara apps chala rahe hai.

-Typing words document 

-Playing music

-Web browser for searching information 

Etc.. simultaneously chal raha hai


Comments ()


Sign in

Read Next

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Evolution of Operating system

Blog banner

Install Ubuntu Easily

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

File system

Blog banner

Hacking

Blog banner

OS Assignment 3

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Cache memory

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Service stratergy principles

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Threading

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

The launch of UniMap by HERE

Blog banner

Deadlock

Blog banner

Session Hijacking Techniques

Blog banner

Uniprocessor scheduling

Blog banner

Operating System

Blog banner

Study of Sniffing Tools

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

PERT Overview

Blog banner

Subnet Masking

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Threads

Blog banner

Bharat Maps

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Memory Partitioning

Blog banner

Cache memory

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Network Forensics

Blog banner

Importance of business process documentation

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

note taker app

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

OS ASSIGNMENT

Blog banner

On-Page SEO

Blog banner