wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory managment

profile
Umang Vora
Jul 05, 2024
0 Likes
0 Discussions
2 Reads

Memory management in an operating system (OS) is like a librarian managing books in a library. Here’s how it works in simple terms:

 

1. **Allocation and Deallocation**: Imagine programs as people borrowing books (memory) from the library. The librarian (OS) gives books to people when they need them and takes the books back when they’re done.

 

2. **Memory Protection**: Each person should only read their own books and not mess with someone else’s. The librarian ensures that people don't take or modify each other’s books.

 

3. **Memory Sharing**: Sometimes, several people might need to read the same book. The librarian lets them share it instead of giving out multiple copies, saving space.

 

4. **Virtual Memory Management**: If the library runs out of physical space (RAM), the librarian can use some space in the back storage (hard disk) to keep extra books. This makes the library seem bigger than it really is.

 

5. **Memory Mapping**: The librarian can make some books available quickly by placing them in a special, easy-to-access area. This is useful for frequently used books.

 

6. **Garbage Collection**: Sometimes, people leave books lying around when they’re done. The librarian goes around and picks up these unused books to put them back on the shelves, making room for others.

 

Overall, memory management ensures that programs run smoothly by efficiently handling the computer's memory, much like a well-organized library where everyone can find and use the books they need.


Comments ()


Sign in

Read Next

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

How to feel Happy everyday day

Blog banner

Virtual Machine

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Virtual Memory

Blog banner

Article on Fresh Book

Blog banner

Process Description

Blog banner

Hacking of web server and application

Blog banner

File management In Operating System

Blog banner

Music is life

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

IT GOVERNANCE

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

The Role of cryptography in cyber security

Blog banner

Development Of Modern Operating System

Blog banner

Sweet Mango Murabba

Blog banner

Operating system and overviews

Blog banner

IoT Architecture Based Security

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Developments in Modern Operating Systems

Blog banner

PERSONAL STORIES

Blog banner

Scala - a programming tool

Blog banner

Compromising Mobile Platforms

Blog banner

Deadlock and starvation

Blog banner

Different Types of Data

Blog banner

Linux

Blog banner

Article on different management system

Blog banner

How Cyber Forensics use in AI

Blog banner

Evolution of Operating system

Blog banner

Brain wash of social media

Blog banner

PROCESS STATE:

Blog banner

Teenagers of Today

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Deadlock

Blog banner

Decoding Confusion Matrix

Blog banner

Animal’s have my heart

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Threads

Blog banner

File management in os

Blog banner