wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
dhruvi acharya
Aug 15, 2024
0 Likes
0 Discussions
83 Reads



Virtual Memory

Virtual memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Deadlock in Operating systems

Blog banner

Starvation

Blog banner

VIRTUAL MACHINE

Blog banner

Types of threads

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Security Issues

Blog banner

RAID and It's Levels

Blog banner

Microsoft Windows Overview

Blog banner

VIRTUAL MACHINES

Blog banner

Memory Management

Blog banner

Race Condition in Operating Theatre

Blog banner

First love

Blog banner

25 Movies to Watch Post Breakup Blues

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Memory management

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Types of Threads

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Be you

Blog banner

IOT Hacking Techniques

Blog banner

Business Intelligence v/s Big Data

Blog banner

Importance of Website

Blog banner

Session Vulnerabilities

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Emailing the merger document

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Buffer overflow

Blog banner

Tracking Emails & Email Crimes

Blog banner

Telegram and it's features

Blog banner

Oracle Corporation

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Data Security must be your Priority!

Blog banner