wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory management

profile
Krishna Parmar
Aug 14, 2024
0 Likes
0 Discussions
36 Reads

The term memory can be defined as a collection of data in a specific format. It is used to store instructions and process data. The memory comprises a large array or group of words or bytes, each with its own location. The primary purpose of a computer system is to execute programs. These programs, along with the information they access, should be in the main memory during execution. The CPU fetches instructions from memory according to the value of the program counter.


To achieve a degree of multiprogramming and proper utilization of memory, memory management is important. Many memory management methods exist, reflecting various approaches, and the effectiveness of each algorithm depends on the situation.


In a multiprogramming computer, the Operating System resides in a part of memory, and the rest is used by multiple processes. The task of subdividing the memory among different processes is called Memory Management. Memory management is a method in the operating system to manage operations between main memory and disk during process execution. The main aim of memory management is to achieve efficient utilization of memory.


Why Memory Management is Required?

Allocate and de-allocate memory before and after process execution.

To keep track of used memory space by processes.

To minimize

fragmentation

issues.

To proper utilization of main memory.

To maintain data integrity while executing of process.


Comments ()


Sign in

Read Next

Trello ( management software)

Blog banner

Virtual Machine

Blog banner

Understanding the 'Ambiverts'

Blog banner

Semaphores

Blog banner

MEMORY MANAGEMENT

Blog banner

Travelling blog

Blog banner

GIS info about Bermuda Triangle

Blog banner

THE ACTORS LIFE

Blog banner

Windows Operating System

Blog banner

INTERNET

Blog banner

Mobile Survey

Blog banner

DISK SCHEDULING

Blog banner

File system implementation

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

An Overview of Virtual Machines

Blog banner

Principles of Service Operation

Blog banner

Modern operating system

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

The Five Steps of Data Science

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Developments in Modern Operating Systems

Blog banner

Importance of Network Security Risk

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Internet of Things

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Memory Management

Blog banner

Components of GIS

Blog banner

Benefits and drawback of web security.

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

A Short History of GIS

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Theads

Blog banner

What is Virtual Memory

Blog banner

Raid and levels of raid.

Blog banner

The Peephole

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Modern OS

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Having passion in life

Blog banner

INTERNET SECURITY

Blog banner