wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Jul 05, 2024
0 Likes
0 Discussions
65 Reads

TOPIC : MEMORY MANAGEMENT

As the word itself states, we are talking about managing the memory on the computer logically and not physically.

 

In the context of OS, the operating system involves the process of managing computer memory by making various decisions and concepts. 

The below key points highlight the memory management process, benefits and usages.

• Allocation & Deallocation: The OS has the role of allocating memory as per requirement and whenever not required the memory should be free or should get deallocated. So that the usage of storage resources are done at maximum level ( pura ache se memory use hoga without wastage of storage).

 

• Memory Protection: The allocated memory is protected and would not be allocated(kisi aur user ko wohi memory allocate nahi hogi) to any other user until the user wishes to  overwrite the memory. As well as it also take care of that data( leak nahi hota).

 

• Process Isolation: mein sab process independent hoti hai taaki koi ek bhi fail ho toh dusre par affect naa ho aur sab continuous manner mein kaam chalta rahe.

 

•Cache Management: Operating system cache memory ko manage karne ka kaam karta hai jisse ki, kaam karne ki speed badh jaati hai, aur current access data store ho sake jo background mein use ho rha hoga.

 

Effective memory management bohot helpful better speednof execution and best use of storage resources ke liye!

 

The below example of running multiple applications at same time helps to explain the concept of memory management:

 

Imagine ke hamare pass 4gb ram ka computer aur ham ek sath background mein bohot sara apps chala rahe hai.

-Typing words document 

-Playing music

-Web browser for searching information 

Etc.. simultaneously chal raha hai


Comments ()


Sign in

Read Next

File management In Operating System

Blog banner

How to kiss

Blog banner

Telegram and it's features

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Wiretapping

Blog banner

HTML vs HTML5

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Note on Process, Process creation and Process termination

Blog banner

I/O Buffering

Blog banner

Design Considerations for Disk Cache Management

Blog banner

I/O Management and Disk Scheduling

Blog banner

File System

Blog banner

Security issues

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

DATA VAULT

Blog banner

Types of Malware in Cyber Security

Blog banner

Ubiquitous Computing

Blog banner

Veg Mix Pickle

Blog banner

Understanding Business Layer in Data Science

Blog banner

Direct memory access

Blog banner

Reconnaissance

Blog banner

DBMS and various career options related to it.

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

MUTUAL EXCLUSION

Blog banner

Cycling

Blog banner

Linux 94

Blog banner

Cache memory

Blog banner

social media issue

Blog banner

Cyber Security Standards

Blog banner

Mumbaicha Dabbawalla

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Memory Management

Blog banner

Direct memory access (DMA)

Blog banner

SQL Injection

Blog banner

Virtualisation

Blog banner

Blog on health and fitness

Blog banner

What if COVID does not exist!

Blog banner

Is Your Password Complex Enough?

Blog banner