CST 334 - Learning Journal Week III
Flavio Cervantes
CST 334
What I learned t his week in CST
334 is how virtual address work, I learned that it’s a piece of memory
allocated and reserved for that specific virtual address. On certain designs,
RAM can utilize the HDD for extra usage if needed. There are certain factors to
be wary of when addressing memory, one must be careful and initialize them
properly to avoid problems such as BSOD, logical errors, or even security
vulnerabilities.
Garbage collection is used to
ensure that the memory is being reclaimed properly so that future commands or
applications have sufficient memory to run, this allows the developer to focus
on the application by not having to manually free memory, this helps preventing
memory leaks. With modern day garbage collectors, it is able to achieve this
with minimal overhead on resources.
I also learned about SED and AWK,
these are used for data manipulation, for example in SED, one can modify text
by finding and replacing the respective value. It’s able to process the input
on each line, and edits them as configured. AWK is similar in the perspective
of data manipulation, the main difference is that sed is better used for text replacements,
inserts, appends, in a one liner approach. AWK on the other hand support
complex loops such as for, if, while so it is better used for .csv files, log
files or any other similar format where it uses delimiters to format the data.
It’s able to perform calculation, reports, summaries. Both are very useful
utilities, it’s just a matter of “using the best tool for the job”.
Comments
Post a Comment