wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Krishna Parmar
Aug 14, 2024
0 Likes
0 Discussions
36 Reads

The term memory can be defined as a collection of data in a specific format. It is used to store instructions and process data. The memory comprises a large array or group of words or bytes, each with its own location. The primary purpose of a computer system is to execute programs. These programs, along with the information they access, should be in the main memory during execution. The CPU fetches instructions from memory according to the value of the program counter.


To achieve a degree of multiprogramming and proper utilization of memory, memory management is important. Many memory management methods exist, reflecting various approaches, and the effectiveness of each algorithm depends on the situation.


In a multiprogramming computer, the Operating System resides in a part of memory, and the rest is used by multiple processes. The task of subdividing the memory among different processes is called Memory Management. Memory management is a method in the operating system to manage operations between main memory and disk during process execution. The main aim of memory management is to achieve efficient utilization of memory.


Why Memory Management is Required?

Allocate and de-allocate memory before and after process execution.

To keep track of used memory space by processes.

To minimize

fragmentation

issues.

To proper utilization of main memory.

To maintain data integrity while executing of process.


Comments ()


Sign in

Read Next

Health and fitness

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

On-Page SEO

Blog banner

Deadlock

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Decision Tree: A Diagram Model

Blog banner

Malware

Blog banner

Way to make your meal healthier.

Blog banner

Optimization of operating system design

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Memory management

Blog banner

The most common internet security threats

Blog banner

Deadlock and Starvation

Blog banner

Android Flashlight Application

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

OS Assignment 3

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Education?

Blog banner

LTE Technology

Blog banner

File system

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Platonic Solids

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Memory management

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Explain Kernel in OS

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Delhi city

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

The application udemy

Blog banner

A book review

Blog banner

File system implementation

Blog banner

JIRA SOFTWARE

Blog banner

Process State

Blog banner

Uniprocessor scheduling

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Direct Memory Access

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Deadlocks in operating system

Blog banner