wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

virtual memory

Blog banner

AI and cyber Security

Blog banner

Virtual memory in Operating System

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

RAID

Blog banner

CoWIN

Blog banner

An Overivew Of Cache Memory

Blog banner

Booting Process In Operating System

Blog banner

Danger assessment in GIS

Blog banner

Modern Operating System

Blog banner

Assignment 2

Blog banner

What is thread and alse multithreading

Blog banner

Deadlock and starvation

Blog banner

Mumbai

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Types of Malware in Cyber Security

Blog banner

Street foods

Blog banner

Microsoft Windows Overview

Blog banner

Article on IT development trends

Blog banner

RAID

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Music is life

Blog banner

Cyber Security in Data Breaching

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

File Management system

Blog banner

Google

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Deadlock and Starvation

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Importance of self defence for girls

Blog banner

Interrupts in operating system.

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

VIRTUAL MACHINES

Blog banner

Smartsheet

Blog banner

IT Service Continuity Management

Blog banner

Modern operating system

Blog banner

Docker Framework

Blog banner

"Games and the future"

Blog banner