wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Malware Defense

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Service Operation

Blog banner

Types of OS

Blog banner

The functions of operating system

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Understanding Mobile Device Forensics

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Cyber Security Control

Blog banner

Save Girl Child

Blog banner

A Deep Dive

Blog banner

E-Cash (Electronic Cash)

Blog banner

GIS REMOTE SENSING

Blog banner

DIGITAL ECONOMY

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

The Right way of cooking

Blog banner

Fitness regime by Deepesh

Blog banner

Process and Threading

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Online Education

Blog banner

Memory Management

Blog banner

Article on different management system

Blog banner

differentiate thinking humanly and rationally

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

c

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Assessing Incident Detection Response Process

Blog banner

GIS Bharat Maps

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Policies for Service Transition

Blog banner

Health and fitness

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Place to visit in pune

Blog banner

DNS Cache

Blog banner

Concurrency management in operating systems

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner