wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

NodeJs

Blog banner

Operating System

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Types of threads

Blog banner

How social media affect

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Europe Through My Lens

Blog banner

Cyber Security Standards

Blog banner

IoT Architecture Based Security

Blog banner

Question

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Memory Management in Operating System

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

A small world of Sockets

Blog banner

What is Spyware? and examples of them.

Blog banner

INSTAGRAM

Blog banner

Deadlock

Blog banner

Loneliness

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Access management

Blog banner

Importance Of Time

Blog banner

Rapido

Blog banner

Data Lake

Blog banner

What is Minting & Mining

Blog banner

Device driver

Blog banner

I/O buffer and its techniques

Blog banner

GOOGLE

Blog banner

Importance of Education

Blog banner

MySQL

Blog banner

OS Assignment-3

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Smartsheet

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Operating system

Blog banner

Memory Management

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner