wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory managment

profile
Umang Vora
Jul 05, 2024
0 Likes
0 Discussions
2 Reads

Memory management in an operating system (OS) is like a librarian managing books in a library. Here’s how it works in simple terms:

 

1. **Allocation and Deallocation**: Imagine programs as people borrowing books (memory) from the library. The librarian (OS) gives books to people when they need them and takes the books back when they’re done.

 

2. **Memory Protection**: Each person should only read their own books and not mess with someone else’s. The librarian ensures that people don't take or modify each other’s books.

 

3. **Memory Sharing**: Sometimes, several people might need to read the same book. The librarian lets them share it instead of giving out multiple copies, saving space.

 

4. **Virtual Memory Management**: If the library runs out of physical space (RAM), the librarian can use some space in the back storage (hard disk) to keep extra books. This makes the library seem bigger than it really is.

 

5. **Memory Mapping**: The librarian can make some books available quickly by placing them in a special, easy-to-access area. This is useful for frequently used books.

 

6. **Garbage Collection**: Sometimes, people leave books lying around when they’re done. The librarian goes around and picks up these unused books to put them back on the shelves, making room for others.

 

Overall, memory management ensures that programs run smoothly by efficiently handling the computer's memory, much like a well-organized library where everyone can find and use the books they need.


Comments ()


Sign in

Read Next

What Your Music Taste Reveals About Your Personality

Blog banner

ProofHub

Blog banner

INTERNET

Blog banner

Data Science & AI

Blog banner

Business Intelligence v/s Big Data

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

LinkedIn

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Deadlocks in Operating System

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Smartsheet

Blog banner

E-Cash (Electronic Cash)

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Cyber Security in Data Breaching

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Memory Management in an Operating System

Blog banner

Dal Bafla Recipe

Blog banner

internet email and it's applications

Blog banner

OLA

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Virtual memory in windows

Blog banner

Assignment-3

Blog banner

Deadlock

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Article on Team Work

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

My favourite food

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

A small world of Sockets

Blog banner

Types of Viruses

Blog banner

Introduction my self

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

AI and Cyber Security

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner