wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory managment

profile
Umang Vora
Jul 05, 2024
0 Likes
0 Discussions
2 Reads

Memory management in an operating system (OS) is like a librarian managing books in a library. Here’s how it works in simple terms:

 

1. **Allocation and Deallocation**: Imagine programs as people borrowing books (memory) from the library. The librarian (OS) gives books to people when they need them and takes the books back when they’re done.

 

2. **Memory Protection**: Each person should only read their own books and not mess with someone else’s. The librarian ensures that people don't take or modify each other’s books.

 

3. **Memory Sharing**: Sometimes, several people might need to read the same book. The librarian lets them share it instead of giving out multiple copies, saving space.

 

4. **Virtual Memory Management**: If the library runs out of physical space (RAM), the librarian can use some space in the back storage (hard disk) to keep extra books. This makes the library seem bigger than it really is.

 

5. **Memory Mapping**: The librarian can make some books available quickly by placing them in a special, easy-to-access area. This is useful for frequently used books.

 

6. **Garbage Collection**: Sometimes, people leave books lying around when they’re done. The librarian goes around and picks up these unused books to put them back on the shelves, making room for others.

 

Overall, memory management ensures that programs run smoothly by efficiently handling the computer's memory, much like a well-organized library where everyone can find and use the books they need.


Comments ()


Sign in

Read Next

Article on Zoho Corporation

Blog banner

I/O Buffering

Blog banner

Mumbai local ......

Blog banner

STARVATION

Blog banner

Excel records

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Memory

Blog banner

Amazon

Blog banner

child Labour

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Evolution of Operating system

Blog banner

Deadlock in Operating System

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Importance of internet

Blog banner

Is It Too Late to Straighten My Teeth as an Adult?

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Deadlock and Starvation

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

What is HTML?

Blog banner

I/O Buffering

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Twisted world

Blog banner

Article on different management system

Blog banner

Data Mapping

Blog banner

Modern Operating Systems.

Blog banner

JIRA SOFTWARE

Blog banner

To-Do List In LISP

Blog banner

Memory management

Blog banner

Decision Tree: A Diagram Model

Blog banner

IOT- Internet Of Things

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Virtual Machine

Blog banner

Cache Memory

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

LinkedIn

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Retiring ISS

Blog banner

Booting Process In Operating System

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

How can parents support a child’s mental health?

Blog banner

Deadlock and Starvation

Blog banner