wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory managment

profile
Umang Vora
Jul 05, 2024
0 Likes
0 Discussions
2 Reads

Memory management in an operating system (OS) is like a librarian managing books in a library. Here’s how it works in simple terms:

 

1. **Allocation and Deallocation**: Imagine programs as people borrowing books (memory) from the library. The librarian (OS) gives books to people when they need them and takes the books back when they’re done.

 

2. **Memory Protection**: Each person should only read their own books and not mess with someone else’s. The librarian ensures that people don't take or modify each other’s books.

 

3. **Memory Sharing**: Sometimes, several people might need to read the same book. The librarian lets them share it instead of giving out multiple copies, saving space.

 

4. **Virtual Memory Management**: If the library runs out of physical space (RAM), the librarian can use some space in the back storage (hard disk) to keep extra books. This makes the library seem bigger than it really is.

 

5. **Memory Mapping**: The librarian can make some books available quickly by placing them in a special, easy-to-access area. This is useful for frequently used books.

 

6. **Garbage Collection**: Sometimes, people leave books lying around when they’re done. The librarian goes around and picks up these unused books to put them back on the shelves, making room for others.

 

Overall, memory management ensures that programs run smoothly by efficiently handling the computer's memory, much like a well-organized library where everyone can find and use the books they need.


Comments ()


Sign in

Read Next

Health and fitness

Blog banner

Bots and Cyber Security

Blog banner

Multicore and Multithreading

Blog banner

Lifestyle of a photographer

Blog banner

Goa Trip With Friends

Blog banner

computer security

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Deadlock

Blog banner

Multiprocessor and scheduling

Blog banner

Blockchain

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Time Series Analysis

Blog banner

Threads

Blog banner

How to tie a Tie

Blog banner

Social media

Blog banner

Risk mitigation and management

Blog banner

Electronic data interchange

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

E-learning

Blog banner

The art of being alone

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Fashion design

Blog banner

RAID

Blog banner

A buffer overflow

Blog banner

Business-to-Business

Blog banner

What is a Malware ?

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Deadlock and starvation in operating system

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Not anti-social, but pro-solitude

Blog banner

Virtual memory

Blog banner

Starvation

Blog banner

To travel is to live

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Memory Management in Operating System

Blog banner

Random Forests

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Measuring IT Risk

Blog banner

VIRTUAL MEMORY

Blog banner