Solved

RAM

Posted on 1998-09-27
2
300 Views
Last Modified: 2013-11-17
how can you determine how much RAM a piece of software occupies as it is executing? What are three ways to cause an application such as MacTuring to be loaded into RAM?
0
Comment
Question by:iloveracing_grl
2 Comments
 

Author Comment

by:iloveracing_grl
ID: 1536453
I need to know by Tuesday, September 29.
0
 

Accepted Solution

by:
jmoliere earned 50 total points
ID: 1536454
how can you determine how much RAM a piece of software occupies as it is executing?  

The most general way of finding out how much memory an application is using is by clicking the apple in the upper left hand corner while in the finder.  Select 'About this computer' and a dialog will display all the applications currently running and the memory they are using.

I don't know anything about Mac Turing.  3 ways to start an application would be to 1)select the application with a mouse click and press 'Apple - O' on the keyboard.
2) Double clicking the application from the finder.
3) Single clicking the application in Launcher (a short cut to the application is usually found in the launcher program -- inside the control panel).

I hope this helps.

For your info,
when you quit an application and you then select 'About this computer' and you notice that you didn't get some or all of your memory back after quitting the application, you know that the app has errors in it called 'memory leaks'.  The only way to get your memory back is to restart your computer.  This problem is fairly common in applications.
0

Featured Post

Webinar: Aligning, Automating, Winning

Join Dan Russo, Senior Manager of Operations Intelligence, for an in-depth discussion on how Dealertrack, leading provider of integrated digital solutions for the automotive industry, transformed their DevOps processes to increase collaboration and move with greater velocity.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Apple's line of laptop computers has made significant strides forward in the last few years. The biggest change being the switch to Intel processors in 2005. One thing about Apple hardware, especially that from a few years ago, is the tendency for i…
There is a security feature on iOS devices that is nearly impenetrable when it has been activated.  This article will provide some possible solutions as well as necessary steps to take to ensure you do not end up with a locked device.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question