How can application use memory via the win32 api, Operating System

Assignment Help:

Q. Explain some of the ways an application can use memory via the Win32 API.

Answer: (1) Virtual memory offers several functions that allow an application to reserve and release memory and specifying the virtual address at which the memory is allocated.

(2) A file possibly memory mapped into address space providing a means for two processes to share memory.

(3) When a Win32 procedure is initialized it is created with a default heap. Private heaps is able to be created that provide regions of reserved address space for applications. Thread management functions are offers to allocate and control thread access to private heaps.

(4) A thread-local storage mechanism offers a way for global and static data to work properly in a multithreaded environment. Thread-lock storage assign global storage on a per-thread basis.


Related Discussions:- How can application use memory via the win32 api

File management, five major activities on file management in operating syst...

five major activities on file management in operating system.? Explain it.?

Illustrate advantages and inconveniences of klt, ADVANTAGES AND INCONVENIEN...

ADVANTAGES AND INCONVENIENCES OF KLT Advantages: the kernel be able to simultaneously schedule many threads of the same process on many processors blocking

What is dispatch latency, What is dispatch latency? The time taken by t...

What is dispatch latency? The time taken by the dispatcher to stop one process and begin another running is known as dispatch latency.

Question, A paper mill produces two grades of paper viz., X and Y. Because ...

A paper mill produces two grades of paper viz., X and Y. Because of raw material restrictions, it cannot produce more than 400 tons of grade X paper and 300 tons of grade Y paper i

Enforce memory protection at compile time?, Why is it not possible to enfor...

Why is it not possible to enforce memory protection at compile time?   Every process should be protected against unwanted interference by other process, whether intentional or

Virtual addresses, Virtual addresses are made up of two parts: the ?rst par...

Virtual addresses are made up of two parts: the ?rst part is the page number, and the second part is an offset inside that page. Suppose our pages are 4kb (4096 = 212 bytes) long,

Define segmentation, Define Segmentation  The memory allocation method...

Define Segmentation  The memory allocation method subject to “external” fragmentation is Segmentation.

#title:cs604, Consider a scenario of post mailbox, there are two processes ...

Consider a scenario of post mailbox, there are two processes named sender S and receiver R. Both processes can communicate with each other by name along with message. You need to I

Model, list trhe various classification of model and types?

list trhe various classification of model and types?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd