wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Scheduling

Blog banner

DIGITAL ECONOMY

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Bharat Maps

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Traveling

Blog banner

Monday. com App

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Ransomware

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

How to Run your First android App

Blog banner

S-Tool : Steganography

Blog banner

MODERN OPERATING SYSTEM

Blog banner

(Input/Output) in os

Blog banner

GIS in Disaster Management

Blog banner

Jio .....A Revolution ?? ??

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Memory hierarchy

Blog banner

internet email and it's applications

Blog banner

What is Spyware? and examples of them.

Blog banner

Bit Coins

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

'Positivity in life'

Blog banner

File management in os

Blog banner

Beatbox

Blog banner

Uniprocessor scheduling

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Operating System

Blog banner

GraphQL

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Session Vulnerabilities

Blog banner

Article on different management system

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Swiggi

Blog banner

Phishing

Blog banner

Question

Blog banner

Explain DBMS in Brief

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Electronic Funds Transfer

Blog banner