wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Chirag Varu
Jul 04, 2024
0 Likes
0 Discussions
81 Reads

What is Memory Management?

Memory management refers to the system of controlling and coordinating laptop memory, assigning blocks to numerous running packages to optimize usual device overall performance. It guarantees that each technique has enough reminiscence to execute and that the system runs successfully.


Features :

Process Isolation:

  • The running system (OS) ought to make sure that each program walking on a laptop doesn’t interfere with some other program's information or commands.
    Example: Imagine you are running a web browser and a phrase processor on the equal time. The OS makes positive that the internet browser can not trade the record you are writing in the word processor and vice versa

Automatic Allocation and Management:

  • The OS mechanically manages and allocates reminiscence to applications as needed with out bothering the programmer about reminiscence limitations.
    Example: When you open a couple of applications, like a song participant and a sport, the OS allocates memory to each utility dynamically with a purpose to run easily with out you having to manipulate the memory manually.

Support of Modular Programming:

  • Programmers can create software elements (modules), and they are able to effortlessly add, do away with, or resize these components even as this system is strolling.
    Example: If you are growing a software program utility and also you want to feature a brand new function or dispose of an vintage one, you could accomplish that dynamically with out preventing the complete software.

Protection and Access Control:

  • The OS guarantees that while reminiscence can be shared between programs whilst wanted, it also protects applications from unauthorized get entry to to their memory.
    Example: If your laptop has consumer accounts for one of a kind family individuals, the OS guarantees that one family member’s packages and statistics are blanketed from get right of entry to with the aid of some other member of the family until sharing is explicitly allowed.

Long-term Storage:

  • Some applications need to save statistics even if the pc is grew to become off, and the OS provides methods to store this records permanently.
    Example: When you store a report in your word processor, the file is saved to your tough drive or SSD so that you can get admission to it once more even once you restart your computer.

 

Div - A

Chirag varu
Sap ID: 53003230110


Comments ()


Sign in

Read Next

Synchronization

Blog banner

Health and fitness

Blog banner

Virtual Machine

Blog banner

Deadlock

Blog banner

On-Page SEO

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

File system

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

How to Manage Employees and Tasks in One System (Without Excel)

Blog banner

Virtual memory

Blog banner

Mumbai Metro 3

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Buffer overflow

Blog banner

Deadlock

Blog banner

Memory Management

Blog banner

ADIDAS

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Operation system

Blog banner

RAID - LEVELS OF RAID

Blog banner

Deadlock in operating system

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Caching windows

Blog banner

De-Coding Love

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

I/O Management and Disk Scheduling

Blog banner

Starting Android Activity Using Intent

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

gis substation

Blog banner

My favourite food

Blog banner

Deadlocks

Blog banner

virtual memory

Blog banner

Secure Hypertext transfer protocol

Blog banner

Message Passing in OS

Blog banner

Risk mitigation and management

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

E-learning

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner