wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Top 5 Benefits of Artificial Intelligence

Blog banner

"Games and the future"

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

How to write a cover letter

Blog banner

Introduction to GIS

Blog banner

The Peephole

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Man VS Nature

Blog banner

Cyber Security in Data Breaching

Blog banner

ZOHO

Blog banner

PERSONAL STORIES

Blog banner

Benefits of yoga and meditation

Blog banner

Blockchain technology: security risk and prevention

Blog banner

This is my first blog.

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Memory Management

Blog banner

Cryptanalysis tool

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Operating system

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

GIS Topography

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Article on Team Work

Blog banner

Memory

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Information of meesho company

Blog banner

Technical SEO : Total Guide

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

MODERN OPERATING SYSTEM

Blog banner

DBMS and various career options related to it.

Blog banner

Know your Processors!

Blog banner

Every body is beautiful

Blog banner

Review on Recovering Deleted Files

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Memory management

Blog banner

K-means use cases

Blog banner

virtual machine

Blog banner