wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Virtual Memory

profile
Prithika Burmon
Aug 15, 2024
0 Likes
0 Discussions
68 Reads
  1. Virtual Memory is a capacity assignment conspire in which auxiliary memory can be tended to as in spite of the fact that it were portion of the fundamental memory.
  2. A virtual memory is what its title demonstrates- it is an figment of a memory that is bigger than the genuine memory. We allude to the program component of virtual memory as a virtual memory chief. The premise of virtual memory is the noncontiguous memory allotment demonstrate.
  3. The virtual memory director expels a few components from memory to make room for other components.


Types of Virtual Memory


  • Paging

Paging separates memory into little fixed-size squares called pages. When the computer runs out of Smash, pages that aren't right now in utilize are moved to the difficult drive, into an region called a swap record. The swap record acts as an expansion of Smash. When a page is required once more, it is swapped back into Slam, a prepare known as page swapping. This guarantees that the working framework (OS) and applications have sufficient memory to run.


  • Segmentation

Segmentation partitions virtual memory into portions of diverse sizes. Portions that aren't as of now required can be moved to the difficult drive. The framework employments a portion table to keep track of each segment's status, counting whether it's in memory, if it's been adjusted, and its physical address. Sections are mapped into a process's address space as it were when needed.


Comments ()


Sign in

Read Next

Image Steganalysis in Digital Forensics

Blog banner

Deadlock

Blog banner

How to kiss

Blog banner

Routers

Blog banner

What is metaverse?

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Deadlock and Starvation

Blog banner

IO Buffers

Blog banner

Power of words

Blog banner

Memory management

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Deadlock and Starvation

Blog banner

Real Time Scheduling

Blog banner

MODERN OPERATING SYSTEM

Blog banner

The launch of UniMap by HERE

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

geographic information system (GIS)

Blog banner

Embedded Operating System

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Top 10 Logos and their meanings

Blog banner

Access management

Blog banner

Save Girl Child

Blog banner

The Features of Blockchain

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Electronic Funds Transfer

Blog banner

Virtual Machine

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Not anti-social, but pro-solitude

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

DIGITAL ECONOMY

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Deadlock and Starvation

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Indian Culture and Tradition

Blog banner

Article on IT development trends

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Facebook marketing

Blog banner

GIS Topography

Blog banner

Multiprocessor

Blog banner

How social media affect

Blog banner