wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Krishna Parmar
Aug 14, 2024
0 Likes
0 Discussions
36 Reads

The term memory can be defined as a collection of data in a specific format. It is used to store instructions and process data. The memory comprises a large array or group of words or bytes, each with its own location. The primary purpose of a computer system is to execute programs. These programs, along with the information they access, should be in the main memory during execution. The CPU fetches instructions from memory according to the value of the program counter.


To achieve a degree of multiprogramming and proper utilization of memory, memory management is important. Many memory management methods exist, reflecting various approaches, and the effectiveness of each algorithm depends on the situation.


In a multiprogramming computer, the Operating System resides in a part of memory, and the rest is used by multiple processes. The task of subdividing the memory among different processes is called Memory Management. Memory management is a method in the operating system to manage operations between main memory and disk during process execution. The main aim of memory management is to achieve efficient utilization of memory.


Why Memory Management is Required?

Allocate and de-allocate memory before and after process execution.

To keep track of used memory space by processes.

To minimize

fragmentation

issues.

To proper utilization of main memory.

To maintain data integrity while executing of process.


Comments ()


Sign in

Read Next

Memory Management

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

VIRTUAL MACHINE

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Android Flashlight Application

Blog banner

What is E-commerce

Blog banner

Decoding Confusion Matrix

Blog banner

Threads

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Virtual memory

Blog banner

FRIENDSHIP

Blog banner

Data Mining

Blog banner

RAID_142

Blog banner

Hey Aryan here

Blog banner

Deadlock

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Financial Fraud Detection

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Types of Hackers

Blog banner

Deadlock

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Virtual memory in Operating System

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Os Virtual Memory

Blog banner

RAID - LEVELS OF RAID

Blog banner

Session Hijacking

Blog banner

RAID and It's Levels

Blog banner

Types of Hackers.

Blog banner

Memory

Blog banner

differentiate thinking humanly and rationally

Blog banner

Introduction to Virtual Memory - 080

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Deadlock and Starvation

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Different types of scam frauds

Blog banner

Atlantis - The Lost Island.........

Blog banner