wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory Management

profile
Chirag Varu
Jul 04, 2024
0 Likes
0 Discussions
81 Reads

What is Memory Management?

Memory management refers to the system of controlling and coordinating laptop memory, assigning blocks to numerous running packages to optimize usual device overall performance. It guarantees that each technique has enough reminiscence to execute and that the system runs successfully.


Features :

Process Isolation:

  • The running system (OS) ought to make sure that each program walking on a laptop doesn’t interfere with some other program's information or commands.
    Example: Imagine you are running a web browser and a phrase processor on the equal time. The OS makes positive that the internet browser can not trade the record you are writing in the word processor and vice versa

Automatic Allocation and Management:

  • The OS mechanically manages and allocates reminiscence to applications as needed with out bothering the programmer about reminiscence limitations.
    Example: When you open a couple of applications, like a song participant and a sport, the OS allocates memory to each utility dynamically with a purpose to run easily with out you having to manipulate the memory manually.

Support of Modular Programming:

  • Programmers can create software elements (modules), and they are able to effortlessly add, do away with, or resize these components even as this system is strolling.
    Example: If you are growing a software program utility and also you want to feature a brand new function or dispose of an vintage one, you could accomplish that dynamically with out preventing the complete software.

Protection and Access Control:

  • The OS guarantees that while reminiscence can be shared between programs whilst wanted, it also protects applications from unauthorized get entry to to their memory.
    Example: If your laptop has consumer accounts for one of a kind family individuals, the OS guarantees that one family member’s packages and statistics are blanketed from get right of entry to with the aid of some other member of the family until sharing is explicitly allowed.

Long-term Storage:

  • Some applications need to save statistics even if the pc is grew to become off, and the OS provides methods to store this records permanently.
    Example: When you store a report in your word processor, the file is saved to your tough drive or SSD so that you can get admission to it once more even once you restart your computer.

 

Div - A

Chirag varu
Sap ID: 53003230110


Comments ()


Sign in

Read Next

Direct memory access

Blog banner

Population

Blog banner

Memory management and virtual memory

Blog banner

Raid and levels of raid.

Blog banner

(Input/Output) in os

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

PHONE TECHNOLOGY

Blog banner

Concept and definition of m-commerce

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Starvation

Blog banner

Electronic Funds Transfer

Blog banner

PERT Overview

Blog banner

File Management

Blog banner

Multicore and multithreading 171

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Street foods

Blog banner

Principles of Concurrency

Blog banner

Use case of K-means clustering

Blog banner

Indian Culture and Tradition

Blog banner

Interesting fact about kangaroo.

Blog banner

E-commerce

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

I/O Management and Disk Scheduling

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

TAILS OS

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Types of email

Blog banner

Virtual Memory

Blog banner

Precision-Recall in Data Science

Blog banner

The Memory Hierarchy

Blog banner

Internet of Things

Blog banner

File management

Blog banner

Emerging threats in cyber Forensics

Blog banner

Mumbai famous street food

Blog banner

Blockchain Transactions

Blog banner

memory cache

Blog banner

The Role of cryptography in cyber security

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner