wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
dhruvi acharya
Aug 15, 2024
0 Likes
0 Discussions
83 Reads



Virtual Memory

Virtual memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

AI and cyber Security

Blog banner

Importance of Network Security Risk

Blog banner

Emerging threats in cyber Forensics

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Memory Management

Blog banner

Wedding photographer

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Importance of self defence for girls

Blog banner

Pandas Matrix Applications

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Traditional Unix System

Blog banner

Cyber Security in Data Breaching

Blog banner

Importance of Education

Blog banner

MEMORY HIERARCHY

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Deming’s Process

Blog banner

operating system

Blog banner

Data is an asset and it is your responsibility!

Blog banner

My First Dream Bike

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

HubSpot

Blog banner

Ethical Hacking

Blog banner

Sage

Blog banner

Modern OS

Blog banner

INTRODUCTION

Blog banner

Remote Work in 2026

Blog banner

Cache memory

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Disk Management

Blog banner

Virtual Machine

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Time Series Analysis

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Operating System Objectives and Functions

Blog banner

VIRUS

Blog banner

Introduction to GIS

Blog banner

Concurrency and Deadlocks

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner