wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Blockchain Transactions

Blog banner

Threads

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Precision-Recall in Data Science

Blog banner

Buffering

Blog banner

15 Interesting Facts about India

Blog banner

Remote Work in 2026

Blog banner

Google classroom

Blog banner

Health and fitness

Blog banner

Jira Software

Blog banner

Memory heirachy (Operating system)

Blog banner

How to Conquer Depression ?

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Virtual Memory

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Indian Culture and Tradition

Blog banner

Virtual Memory

Blog banner

Riddhi Miyani 53003220140

Blog banner

Google

Blog banner

Memory Management

Blog banner

TAILS OS

Blog banner

Starting Android Activity Using Intent

Blog banner

DATA VAULT

Blog banner

VIRTUAL MACHINE

Blog banner

PODIO

Blog banner

Short note on expert system

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Power of words

Blog banner

10 Problems you face if you are an Otaku

Blog banner

S-Tool : Steganography

Blog banner

How to kiss

Blog banner

Fitness

Blog banner

Supervised and unsupervised learning

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Ethical Hacking

Blog banner

Raid

Blog banner

"Audit" In Data Science

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Deadlocks in Operating Systems

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner