wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Trello ( management software)

Blog banner

Process and Threading

Blog banner

Synchronization

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

bulk email software

Blog banner

INTRODUCTION

Blog banner

Social Media Sentiment Analysis

Blog banner

Cache memory

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Uniprocessor Scheduling

Blog banner

FREE VERSION OF G-MAIL

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Deadlock and Starvation

Blog banner

Deadlock in operating system

Blog banner

E-learning in today's world

Blog banner

DIGITAL ECONOMY

Blog banner

Uniprocessor Scheduling

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Virtual machine and virtualizing

Blog banner

Culture Of Ladakh

Blog banner

Data Analytics in Data Science

Blog banner

Measuring IT Risk

Blog banner

Never give up

Blog banner

Service Operation

Blog banner

Internet of Things

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

CoWIN

Blog banner

What your Favorite colour says about You?

Blog banner

Multicore and Multithreading

Blog banner

Uniprocessor scheduling

Blog banner

My First Dream Bike

Blog banner

GIS in Disaster Management

Blog banner

How To Secure Operating Systems ?

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

5 Stages of Digital Marketing

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

MEMORY HIERARCHY

Blog banner

10 Interesting Facts about Death Note

Blog banner

Linux 94

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

What is Data, Information and Knowledge?

Blog banner

Photorec - media recovery tool

Blog banner