The Single Best Strategy To Use For dirty bit
Functioning techniques: Running methods use dirty bits to trace which internet pages of memory are actually modified considering that they had been very last published to disk. This enables the functioning program to speedily detect which internet pages need to be composed again to disk when the process is shut down or suspended.What results in the