wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Chirag Varu
Jul 04, 2024
0 Likes
0 Discussions
81 Reads

What is Memory Management?

Memory management refers to the system of controlling and coordinating laptop memory, assigning blocks to numerous running packages to optimize usual device overall performance. It guarantees that each technique has enough reminiscence to execute and that the system runs successfully.


Features :

Process Isolation:

  • The running system (OS) ought to make sure that each program walking on a laptop doesn’t interfere with some other program's information or commands.
    Example: Imagine you are running a web browser and a phrase processor on the equal time. The OS makes positive that the internet browser can not trade the record you are writing in the word processor and vice versa

Automatic Allocation and Management:

  • The OS mechanically manages and allocates reminiscence to applications as needed with out bothering the programmer about reminiscence limitations.
    Example: When you open a couple of applications, like a song participant and a sport, the OS allocates memory to each utility dynamically with a purpose to run easily with out you having to manipulate the memory manually.

Support of Modular Programming:

  • Programmers can create software elements (modules), and they are able to effortlessly add, do away with, or resize these components even as this system is strolling.
    Example: If you are growing a software program utility and also you want to feature a brand new function or dispose of an vintage one, you could accomplish that dynamically with out preventing the complete software.

Protection and Access Control:

  • The OS guarantees that while reminiscence can be shared between programs whilst wanted, it also protects applications from unauthorized get entry to to their memory.
    Example: If your laptop has consumer accounts for one of a kind family individuals, the OS guarantees that one family member’s packages and statistics are blanketed from get right of entry to with the aid of some other member of the family until sharing is explicitly allowed.

Long-term Storage:

  • Some applications need to save statistics even if the pc is grew to become off, and the OS provides methods to store this records permanently.
    Example: When you store a report in your word processor, the file is saved to your tough drive or SSD so that you can get admission to it once more even once you restart your computer.

 

Div - A

Chirag varu
Sap ID: 53003230110


Comments ()


Sign in

Read Next

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Ethical Hacking

Blog banner

Memory Management in Operating System

Blog banner

Memory Management

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Importance of modern technology era

Blog banner

A Journey By Train

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Cache memory

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Session Hijacking

Blog banner

City of Mumbai (Bombay):

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Virtual memory

Blog banner

Types of Malware in Cyber Security

Blog banner

Pandas Matrix Applications

Blog banner

Virtual Memory

Blog banner

How to grow followers on Instagram business account?

Blog banner

Computer Security

Blog banner

Developments in Modern Operating Systems

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Data Warehouse Bus Matrix

Blog banner

Process and Threading

Blog banner

Multicore and Multithreading

Blog banner

Getting started with Android Studio

Blog banner

I/O Management and Disk Scheduling

Blog banner

PHISHING

Blog banner

Components of GIS

Blog banner

Principles of Service Operation

Blog banner

Expert System In AI

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Gis in agriculture and farming

Blog banner

SAVE TREES

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Blockchain

Blog banner

What is service level Agreement?

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Modern operating system

Blog banner

E-security systems | CCTV

Blog banner

My Favorite Country

Blog banner