wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
dhruvi acharya
Aug 15, 2024
0 Likes
0 Discussions
83 Reads



Virtual Memory

Virtual memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Odoo

Blog banner

The Laws of Karma

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Virtual Machine's

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

What is Amazon?

Blog banner

Retiring ISS

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Career v/s Job : Choose your passion

Blog banner

Why we should do reading

Blog banner

Uber

Blog banner

PHONE TECHNOLOGY

Blog banner

Music

Blog banner

File Management In OS

Blog banner

Mumbai Metro 3

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Some web vulnerabilities

Blog banner

Memory Management in Operating System

Blog banner

Coping with Diagnosis Shock

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

"Games and the future"

Blog banner

CRISP-DM Methodology

Blog banner

What is process

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Quality check in IT services

Blog banner

LISP - Library Management System

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Emailing the merger document

Blog banner

Operating system and overviews

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Best Time to Visit Arcadia, Florida & Why Oak Tree Hotel Is Always Ready

Blog banner

SMARTSHEET

Blog banner

Phishing

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Scheduling

Blog banner