wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Aryan Pawar
Jul 12, 2023
0 Likes
0 Discussions
49 Reads

Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer's operating system (OS).Virtual memory uses both hardware and software to enable a computer to compensate for physical memory shortages, temporarily transferring data from random access memory RAM to disk storage. Mapping chunks of memory to disk files enables a computer to treat secondary memory as though it were main memory.Today, most personal computers (PCs) come with at least 8 GB (gigabytes) of RAM. But, sometimes, this is not enough to run several programs at one time. This is where virtual memory comes in. Virtual memory frees up RAM by swapping data that has not been used recently over to a storage device, such as a hard drive or solid-state drive SSDVirtual memory was developed at a time when physical memory -- also referenced as RAM -- was expensive. Computers have a finite amount of RAM, so memory will eventually run out when multiple programs run at the same time. A system using virtual memory uses a section of the hard drive to emulate RAM. With virtual memory, a system can load larger or multiple programs running at the same time, enabling each one to operate as if it has more space, without having to purchase more RAM.

 


Comments ()


Sign in

Read Next

Concurrency and Deadlocks

Blog banner

Logical and physical address

Blog banner

Importance of education

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Direct memory access

Blog banner

Data Mapping

Blog banner

The Sunny Side of Instagram

Blog banner

Mumbai famous street food

Blog banner

Never give up

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Linux Threads:

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

You'll get to know about Pankaj Negi

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Security Issues and Countermeasures

Blog banner

File Organization and Access

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

INTRODUCTION TO C#

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Guidelines for a low sodium diet.

Blog banner

Apple

Blog banner

Royal enfield

Blog banner

Service transistion under difficult conditions

Blog banner

Game via listing method

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

What is semaphore in operating system?

Blog banner

Memory Management

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Hey Aryan here

Blog banner

Evolution of Operating Sytems

Blog banner

12 Principles of Animation

Blog banner

Operating system

Blog banner

Precision-Recall in Data Science

Blog banner

Delhi city

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

differentiate thinking humanly and rationally

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner