wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Vansh Dedhia
Jul 05, 2024
0 Likes
0 Discussions
65 Reads

TOPIC : MEMORY MANAGEMENT

As the word itself states, we are talking about managing the memory on the computer logically and not physically.

 

In the context of OS, the operating system involves the process of managing computer memory by making various decisions and concepts. 

The below key points highlight the memory management process, benefits and usages.

• Allocation & Deallocation: The OS has the role of allocating memory as per requirement and whenever not required the memory should be free or should get deallocated. So that the usage of storage resources are done at maximum level ( pura ache se memory use hoga without wastage of storage).

 

• Memory Protection: The allocated memory is protected and would not be allocated(kisi aur user ko wohi memory allocate nahi hogi) to any other user until the user wishes to  overwrite the memory. As well as it also take care of that data( leak nahi hota).

 

• Process Isolation: mein sab process independent hoti hai taaki koi ek bhi fail ho toh dusre par affect naa ho aur sab continuous manner mein kaam chalta rahe.

 

•Cache Management: Operating system cache memory ko manage karne ka kaam karta hai jisse ki, kaam karne ki speed badh jaati hai, aur current access data store ho sake jo background mein use ho rha hoga.

 

Effective memory management bohot helpful better speednof execution and best use of storage resources ke liye!

 

The below example of running multiple applications at same time helps to explain the concept of memory management:

 

Imagine ke hamare pass 4gb ram ka computer aur ham ek sath background mein bohot sara apps chala rahe hai.

-Typing words document 

-Playing music

-Web browser for searching information 

Etc.. simultaneously chal raha hai


Comments ()


Sign in

Read Next

File management

Blog banner

A book review

Blog banner

Brain wash of social media

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

Virtual memory

Blog banner

What are Virtual Machines

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Memory input output management

Blog banner

Iphone or Android which is the best smartphone?

Blog banner

Network Forensics Tools and Techniques

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Importance of Network Security Risk

Blog banner

Raid and levels of raid.

Blog banner

Why Friendship at Work is Important

Blog banner

How Cyber Forensics use in AI

Blog banner

File Management In OS

Blog banner

Apache Kafka

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

How to Conquer Depression ?

Blog banner

Virtual memory

Blog banner

An Overview of Virtual Machines

Blog banner

STARVATION

Blog banner

Big Data Architecture

Blog banner

Routers

Blog banner

Uniprocessor Scheduling

Blog banner

The Peephole

Blog banner

Record Blocking

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Operating Systems

Blog banner

Junk food vs healthy food

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Paid Email

Blog banner

Deadlock

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Explain Kernel in OS

Blog banner