wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

IP Address

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Android Flashlight Application

Blog banner

Jira Software

Blog banner

Photorec - media recovery tool

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Buffering

Blog banner

Honeypot in cyber security

Blog banner

NodeJs

Blog banner

E-learning in today's world

Blog banner

What is Spyware? and examples of them.

Blog banner

Privacy LAWs in IT

Blog banner

Cache memory

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

Starvation

Blog banner

THE ACTORS LIFE

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Be you

Blog banner

10 Signs your Computer has Virus

Blog banner

Deadlock and starvation

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Child labour

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Importance of Education

Blog banner

Self defence

Blog banner

VIRTUAL MACHINE

Blog banner

Spotify

Blog banner

Social Media Marketing Trends 2022

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Multicore CPUs

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Fitness

Blog banner

Hosting basics

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

I/O Buffering

Blog banner

VPN

Blog banner

Ransomware

Blog banner

I/O Management and Disk Scheduling

Blog banner

Cache memory

Blog banner