wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

operating system

profile
Palak Santoki
Jul 05, 2024
0 Likes
0 Discussions
39 Reads

Memory is the important part of the computer that is used to store the data. Its management is critical to the computer system because the amount of main memory available in a computer system is very limited. to increase performance, several processes are executed simultaneously. For this, we must keep several processes in the main memory, so it is even more important to manage them effectively.Memory manager is used to keep track of the status of memory locations, whether it is free or allocated.The memory manager is responsible for protecting the memory allocated to each process from being corrupted by another process. Memory managers should enable sharing of memory space between processes.memory manager permits computers with a smaall amount of main memory to execute programs larger than the size or amount of available memory.it does thiss by moving information back and forth between primary memory and secondary memory by using the concpt of swapping.memory managers should enable sharing of memoey spacebetween processss.thus two programs can reside at same memory location although at different times.
there are two types of memory management techniques:
Contiguous memory management and Non-Contiguous memory management.
In a Contiguous memory management scheme, each program occupies a single contiguous block of storage locations, i.e., a set of memory locations with addresses.
In a Non-Contiguous memory management scheme, the program is divided into different blocks and loaded at different portions of the memory that need not necessarily be adjacent to one another. This scheme can be classified depending upon the size of blocks and whether the blocks reside in the main memory or not.

memory mannagment is requried for following reasons:

1.allocate and reallocate memory before and after program execution.

2.To keep track of used memory space by processes.

3.To properly utilie main memory.

4.To maintain data integrity while executing process.


Comments ()


Sign in

Read Next

Inventory management software system

Blog banner

Data Warehouse Bus Matrix

Blog banner

RACI model in IT services

Blog banner

12 Principles of Animation

Blog banner

semaphores

Blog banner

Multicore and Multithreading

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Understanding E-mail Servers

Blog banner

GIS Mapping

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

 " Healing of Yoga "

Blog banner

Sweet Mango Murabba

Blog banner

Types of Viruses

Blog banner

Importance of Website

Blog banner

Linux Threads:

Blog banner

What is thread and alse multithreading

Blog banner

SQL Injection

Blog banner

Importance of modern technology era

Blog banner

How to grow followers on Instagram business account?

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Photorec - media recovery tool

Blog banner

VPN

Blog banner

BITCOIN WALLET

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Session Vulnerabilities

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Man In The Middle Attack

Blog banner

File management in os

Blog banner

Blockchain Security Technique

Blog banner

HTML vs HTML5

Blog banner

Electronic data interchange

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

How can parents support a child’s mental health?

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Multiprocessor and Multicore Organization

Blog banner

VIRTUAL MACHINE

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Mental Health

Blog banner

Quality check in IT services

Blog banner

Principal of concurrency

Blog banner

Security in Cloud Computing

Blog banner