wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Virtual Memory

profile
Prithika Burmon
Aug 15, 2024
0 Likes
0 Discussions
68 Reads
  1. Virtual Memory is a capacity assignment conspire in which auxiliary memory can be tended to as in spite of the fact that it were portion of the fundamental memory.
  2. A virtual memory is what its title demonstrates- it is an figment of a memory that is bigger than the genuine memory. We allude to the program component of virtual memory as a virtual memory chief. The premise of virtual memory is the noncontiguous memory allotment demonstrate.
  3. The virtual memory director expels a few components from memory to make room for other components.


Types of Virtual Memory


  • Paging

Paging separates memory into little fixed-size squares called pages. When the computer runs out of Smash, pages that aren't right now in utilize are moved to the difficult drive, into an region called a swap record. The swap record acts as an expansion of Smash. When a page is required once more, it is swapped back into Slam, a prepare known as page swapping. This guarantees that the working framework (OS) and applications have sufficient memory to run.


  • Segmentation

Segmentation partitions virtual memory into portions of diverse sizes. Portions that aren't as of now required can be moved to the difficult drive. The framework employments a portion table to keep track of each segment's status, counting whether it's in memory, if it's been adjusted, and its physical address. Sections are mapped into a process's address space as it were when needed.


Comments ()


Sign in

Read Next

Evolution of Operating Sytems

Blog banner

Process and Threading

Blog banner

Fault tolerance

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Why home remedies don’t work for Hangover?

Blog banner

Measuring IT Risk

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Memory Partitioning

Blog banner

Digital Forensics Challenges and Tools

Blog banner

City of Mumbai (Bombay):

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Asana

Blog banner

'Positivity in life'

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Steganography

Blog banner

Tools to support CSI activities

Blog banner

Network Forensics Tools and Techniques

Blog banner

Atlantis - The Lost Island.........

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Service tax applied on sanitary pads and not condoms

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Introduction my self

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Health is Wealth

Blog banner

How social media affect

Blog banner

File management

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Memory management

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Deadlock and Starvation

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Artical on FreshBooks

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Man is free by the birth .

Blog banner

gis substation

Blog banner