wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Jul 05, 2024
0 Likes
0 Discussions
65 Reads

TOPIC : MEMORY MANAGEMENT

As the word itself states, we are talking about managing the memory on the computer logically and not physically.

 

In the context of OS, the operating system involves the process of managing computer memory by making various decisions and concepts. 

The below key points highlight the memory management process, benefits and usages.

• Allocation & Deallocation: The OS has the role of allocating memory as per requirement and whenever not required the memory should be free or should get deallocated. So that the usage of storage resources are done at maximum level ( pura ache se memory use hoga without wastage of storage).

 

• Memory Protection: The allocated memory is protected and would not be allocated(kisi aur user ko wohi memory allocate nahi hogi) to any other user until the user wishes to  overwrite the memory. As well as it also take care of that data( leak nahi hota).

 

• Process Isolation: mein sab process independent hoti hai taaki koi ek bhi fail ho toh dusre par affect naa ho aur sab continuous manner mein kaam chalta rahe.

 

•Cache Management: Operating system cache memory ko manage karne ka kaam karta hai jisse ki, kaam karne ki speed badh jaati hai, aur current access data store ho sake jo background mein use ho rha hoga.

 

Effective memory management bohot helpful better speednof execution and best use of storage resources ke liye!

 

The below example of running multiple applications at same time helps to explain the concept of memory management:

 

Imagine ke hamare pass 4gb ram ka computer aur ham ek sath background mein bohot sara apps chala rahe hai.

-Typing words document 

-Playing music

-Web browser for searching information 

Etc.. simultaneously chal raha hai


Comments ()


Sign in

Read Next

Blockchain Security Technique

Blog banner

Security issues

Blog banner

Operating System

Blog banner

Virtual machine

Blog banner

File management -disha parekh

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Direct Memory Access

Blog banner

SQL Injection Techniques

Blog banner

Lifestyle of a photographer

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Deadlock in Operating systems

Blog banner

memory cache

Blog banner

Direct memory access

Blog banner

GIS Topography

Blog banner

Risk factors in service transistion

Blog banner

IoT Architecture Based Security

Blog banner

What is Email? Uses of Emails

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

How to grow followers on Instagram business account?

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Deadlock in operating system

Blog banner

Internet of Things and cyber security

Blog banner

Objectives and functions of Operating System...

Blog banner

Crypto tax evasion

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Impact of social media on the human life

Blog banner

What is a Dumpster Diving Attack?

Blog banner

DATA WRANGLING

Blog banner

Service Design Principles

Blog banner

Swiggi

Blog banner

Remote Work in 2026

Blog banner

Precision-Recall in Data Science

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Interrupts

Blog banner

Riddhi Miyani 53003220140

Blog banner

The Memory Hierarchy

Blog banner

Operation system

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Linux -V Server Virtual Machine

Blog banner

Royal enfield

Blog banner