CST 334 - Learning Journal Week III

 Flavio Cervantes

CST 334

What I learned t his week in CST 334 is how virtual address work, I learned that it’s a piece of memory allocated and reserved for that specific virtual address. On certain designs, RAM can utilize the HDD for extra usage if needed. There are certain factors to be wary of when addressing memory, one must be careful and initialize them properly to avoid problems such as BSOD, logical errors, or even security vulnerabilities.

Garbage collection is used to ensure that the memory is being reclaimed properly so that future commands or applications have sufficient memory to run, this allows the developer to focus on the application by not having to manually free memory, this helps preventing memory leaks. With modern day garbage collectors, it is able to achieve this with minimal overhead on resources.  

I also learned about SED and AWK, these are used for data manipulation, for example in SED, one can modify text by finding and replacing the respective value. It’s able to process the input on each line, and edits them as configured. AWK is similar in the perspective of data manipulation, the main difference is that sed is better used for text replacements, inserts, appends, in a one liner approach. AWK on the other hand support complex loops such as for, if, while so it is better used for .csv files, log files or any other similar format where it uses delimiters to format the data. It’s able to perform calculation, reports, summaries. Both are very useful utilities, it’s just a matter of “using the best tool for the job”.


Comments

Popular posts from this blog

Learning Journal - CSUMB - January 6, 2025

Learning Journal - Week IV

Learning Journal - CSUMB - January 15, 2025