wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Aryan Pawar
Jul 12, 2023
0 Likes
0 Discussions
49 Reads

Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer's operating system (OS).Virtual memory uses both hardware and software to enable a computer to compensate for physical memory shortages, temporarily transferring data from random access memory RAM to disk storage. Mapping chunks of memory to disk files enables a computer to treat secondary memory as though it were main memory.Today, most personal computers (PCs) come with at least 8 GB (gigabytes) of RAM. But, sometimes, this is not enough to run several programs at one time. This is where virtual memory comes in. Virtual memory frees up RAM by swapping data that has not been used recently over to a storage device, such as a hard drive or solid-state drive SSDVirtual memory was developed at a time when physical memory -- also referenced as RAM -- was expensive. Computers have a finite amount of RAM, so memory will eventually run out when multiple programs run at the same time. A system using virtual memory uses a section of the hard drive to emulate RAM. With virtual memory, a system can load larger or multiple programs running at the same time, enabling each one to operate as if it has more space, without having to purchase more RAM.

 


Comments ()


Sign in

Read Next

Multicore and Multithreading

Blog banner

MAILFENCE

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Quality check in IT services

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Health is Wealth

Blog banner

I/O Management and Disk Scheduling

Blog banner

Critical success factors

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Cyber Forensics

Blog banner

Kafka - A Framework

Blog banner

Virtual Memory

Blog banner

Operating system

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Service design process in ITSM

Blog banner

Cloud Computing

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Starting Android Activity Using Intent

Blog banner

Having passion in life

Blog banner

Steganography

Blog banner

INTERNET SECURITY

Blog banner

Memory input output management

Blog banner

What is Minting & Mining

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Deadlocks

Blog banner

A BLOG ON MYSQL

Blog banner

Traditional UNIX Scheduling

Blog banner

Why Data Security Is Important

Blog banner

Intrusion Detection System

Blog banner

Virtual Machine

Blog banner

OS Assignment 3

Blog banner

ProofHub

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Predicting Student Performance with Data Science

Blog banner

Guidelines for a low sodium diet.

Blog banner

Memory

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Social Engineering Attacks

Blog banner

CRISP-DM Methodology

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

indian premier league

Blog banner