wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Modern Operating System - Khush bagaria

Blog banner

operating system

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Data Science in Mental Health Prediction

Blog banner

IO Buffers

Blog banner

Threads in OS

Blog banner

How to lose belly fat

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Deadlock and starvation

Blog banner

Uniprocessor Scheduling

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Virtual Memory

Blog banner

Mumbai Metro 3

Blog banner

Open Source Project By Google

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Software

Blog banner

Twisted world

Blog banner

Deadlock and Starvation

Blog banner

Memory managment

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

internet email and it's applications

Blog banner

Bulk E-mail software

Blog banner

Environmental Management using GIS

Blog banner

BITCOIN WALLET

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

VIRTUAL MEMORY

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Deadlock

Blog banner

Junk food vs healthy food

Blog banner

Flipkart

Blog banner

Swiggi

Blog banner

Starvation

Blog banner

Cyber Forensics

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Cache memory

Blog banner

Microsoft Windows Overview

Blog banner

Cryptanalysis tool

Blog banner

Logical and physical address

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

virtual machines and virtualization

Blog banner

Regression Analysis

Blog banner

The Sunny Side of Instagram

Blog banner