• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Memory Management

Extracts from this document...


Memory Management Most computers nowadays are capable of holding several programs in memory simultaneously, so that a user can switch from one application to another. The operating system has to allocate memory to each application - as well as to itself! If the OS detects that there is insufficient memory to load an application that the user has asked for, it may swap another application (or part of it) ...read more.


The technique of swapping part of the contents of memory out to disk is known as virtual memory, because it makes the computer appear to have more memory than it actually does. Resource Allocation and Scheduling In larger computer systems which are capable of running several programs at once (multiprogramming), the OS is responsible for allocating processing time, memory and input-output resources to each one. ...read more.


keyboard, a printer sending a message that it is out of paper, the realtime clock interrupting to indicate that the processor should be allocated to the next user in a multiuser system, a hardware or software malfunction. User-Computer Communication The user gives instructions to the computer to start a program, copy a file, send a message to another user, and so on by typing in commands recongnised by the operating system ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    implementation), and it expands on the functionalities of the Web browser and Web server in the Community Edition. Its plug-in components are ideal for speeding our dynamic Web content development. Forte for Java includes Form Editor, multi-threaded debugger, explorer and properties window, object browser, source synchronization, update center and etc.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The user can select which week they are making a booking or modifying a booking for using the drop down menu box at the top which displays the numbers 1 to 52. When the number of the week is changed the booking information for the particular week is loaded into the form.

  1. Statistics - How good are people's memory considering different factors?

    This is especially so, if the questions are directly related to the person's memory. This would embarrass someone if he admitted that he can forget something within the next two hours. Also people would purposely want to make themselves look smart or stupid, depending on the type of people they are.

  2. Processor Scheduling

    / 3 = 17ms As previously said this time can be considerably reduced if the order is reversed. Here is the average waiting time if the processes are reversed. (6 + 0 + 3) / 3 = 3ms This is a significant improvement and reduces waiting time dramatically.

  1. File transfer protocols

    3 Menu Displays menu, accept choice, and call appropriate modules Display or Report 1.1 Initialise Initialises all entries of the table. 1.2 Load Reads in the song details from the file and store in a table. 3.1 Display Displays the number of votes for an input song.

  2. Flexible Architectures in Communication Security Application

    but at the same time allows the intended recipient to retrieve the original information using a secret key. Cryptographic algorithms (or ciphers, as they are often called) are special programs designed to protect sensitive information on public communication networks. During encryption, ciphers transform the original plaintext message into unintelligible ciphertext.

  1. Data Management: Past, Present, and Future

    The systems are in constant change. Indeed, most of the larger database systems in operation today were designed several decades ago and have evolved with technology. A historical perspective helps to understand current systems. There have been six distinct phases in data management.

  2. Primary or Secondary Storage.

    a wordprocessor ; (b) the operating system or the part of the operating system needed to start up the computer; utility programs, including anti-virus programs and disk management programs. NOTE: The contents of ROM cannot be changed in any way (hence read only) not even when the computer is turned off.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work