wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

VIRTUAL MACHINE

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Virtual Memory

Blog banner

Strengthening Active Directory Security

Blog banner

Online Games

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Disk scheduling

Blog banner

Virtual memory

Blog banner

How To Secure Operating Systems ?

Blog banner

How to kiss

Blog banner

HubSpot

Blog banner

Modern Operating system

Blog banner

Scheduling

Blog banner

Deadlock Prevention

Blog banner

E-commerce

Blog banner

Mesh Topology

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Having passion in life

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

What is metaverse?

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

What is service level Agreement?

Blog banner

This too shall pass

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

NETSUITE

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Never give up

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Getting into anime My anime suggestions

Blog banner

Wrike

Blog banner

What is Minting & Mining

Blog banner

Danger assessment in GIS

Blog banner

WORKFRONT SOFTWARE

Blog banner

Message Passing in OS

Blog banner

BrainGate Technology

Blog banner

Clarizen

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner