wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
dhruvi acharya
Aug 15, 2024
0 Likes
0 Discussions
83 Reads



Virtual Memory

Virtual memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Classification Vs Clustring? What's the diffrence?

Blog banner

Explain website hacking issues

Blog banner

FILE SHARING

Blog banner

Operating system

Blog banner

Review on Recovering Deleted Files

Blog banner

virtual memory

Blog banner

What is a geographic information system (GIS)?

Blog banner

Virtual Machine

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

File system

Blog banner

Memory management

Blog banner

Socket Programming in Java

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Blockchain technology: security risk and prevention

Blog banner

38_Exploring The Honeynet Project

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Cyber Laws In India and Around the World

Blog banner

Intrusion Detection Systems - Anushka Linge

Blog banner

WINDOWS I/ O

Blog banner

PPT methodology

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Virtual machine and virtualizing

Blog banner

File and File System Structure

Blog banner

Service stratergy principles

Blog banner

Blockchain uses and use cases

Blog banner

I/O Buffering

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

A small world of Sockets

Blog banner

Worms, viruses and Bots

Blog banner

E-Governance

Blog banner

MailChimp

Blog banner

Risk mitigation and management

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

What is HTML?

Blog banner

Session Hijacking

Blog banner

Threads

Blog banner

Virtual Memory

Blog banner

Why is online marketing is important in current scenario

Blog banner

Man is free by the birth .

Blog banner

Khau Galli – Vile Parle

Blog banner