wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Memory managment

profile
Umang Vora
Jul 05, 2024
0 Likes
0 Discussions
2 Reads

Memory management in an operating system (OS) is like a librarian managing books in a library. Here’s how it works in simple terms:

 

1. **Allocation and Deallocation**: Imagine programs as people borrowing books (memory) from the library. The librarian (OS) gives books to people when they need them and takes the books back when they’re done.

 

2. **Memory Protection**: Each person should only read their own books and not mess with someone else’s. The librarian ensures that people don't take or modify each other’s books.

 

3. **Memory Sharing**: Sometimes, several people might need to read the same book. The librarian lets them share it instead of giving out multiple copies, saving space.

 

4. **Virtual Memory Management**: If the library runs out of physical space (RAM), the librarian can use some space in the back storage (hard disk) to keep extra books. This makes the library seem bigger than it really is.

 

5. **Memory Mapping**: The librarian can make some books available quickly by placing them in a special, easy-to-access area. This is useful for frequently used books.

 

6. **Garbage Collection**: Sometimes, people leave books lying around when they’re done. The librarian goes around and picks up these unused books to put them back on the shelves, making room for others.

 

Overall, memory management ensures that programs run smoothly by efficiently handling the computer's memory, much like a well-organized library where everyone can find and use the books they need.


Comments ()


Sign in

Read Next

The Benefits of Practical Life Activities in Preschool

Blog banner

Importance of internet

Blog banner

Uniprocessor Scheduling

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Security requirements for Safe E-Payments

Blog banner

Digital Forensics Challenges and Tools

Blog banner

How to Conquer Depression ?

Blog banner

From Model Mistakes to Metrics

Blog banner

Getting into Anime

Blog banner

Blockchain uses and use cases

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

The War With Cold On Earth

Blog banner

NIKE

Blog banner

A Deep Dive

Blog banner

Linux VServer Architecture

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Multithreading in Operating System

Blog banner

PROCESS STATE:

Blog banner

KAHAWA TEA

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Threats To Computer System

Blog banner

Artificial Intelligence (AI)

Blog banner

Deadlock in operating system

Blog banner

Concurrency management in operating systems

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Caching windows

Blog banner

GUIDE TO GIS

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

How to kiss

Blog banner

Man VS Nature

Blog banner

Excel records

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

SAVE TREES

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Product Discount Calculator

Blog banner

My Favorite Country

Blog banner

Delhi city

Blog banner

What are Tenders its various types

Blog banner