wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
Aryan Pawar
Jul 12, 2023
0 Likes
0 Discussions
49 Reads

Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory. Virtual memory is a common technique used in a computer's operating system (OS).Virtual memory uses both hardware and software to enable a computer to compensate for physical memory shortages, temporarily transferring data from random access memory RAM to disk storage. Mapping chunks of memory to disk files enables a computer to treat secondary memory as though it were main memory.Today, most personal computers (PCs) come with at least 8 GB (gigabytes) of RAM. But, sometimes, this is not enough to run several programs at one time. This is where virtual memory comes in. Virtual memory frees up RAM by swapping data that has not been used recently over to a storage device, such as a hard drive or solid-state drive SSDVirtual memory was developed at a time when physical memory -- also referenced as RAM -- was expensive. Computers have a finite amount of RAM, so memory will eventually run out when multiple programs run at the same time. A system using virtual memory uses a section of the hard drive to emulate RAM. With virtual memory, a system can load larger or multiple programs running at the same time, enabling each one to operate as if it has more space, without having to purchase more RAM.

 


Comments ()


Sign in

Read Next

Process State

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Embedded Operating System

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

History of ITIL

Blog banner

File Management system

Blog banner

Service Design Principles

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

INTRODUCTION

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Never give up

Blog banner

DIGITAL TECHNOLOGY

Blog banner

GIS Mapping

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

LISP - Library Management System

Blog banner

Virtual Machine

Blog banner

Kafka - A Framework

Blog banner

Developments in Modern Operating Systems

Blog banner

Deadlock and starvation

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Blog on Smartsheet.

Blog banner

Man is free by the birth .

Blog banner

note taker app

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

IT RISK

Blog banner

BITCOIN WALLET

Blog banner

Deadlock in operating system

Blog banner

Computer Security

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

The application udemy

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Delhi city

Blog banner

Memory heirchy

Blog banner

Mobile Survey

Blog banner

Jira Software

Blog banner

Social Media Sentiment Analysis

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Modern Operating Systems

Blog banner