wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

MailChimp

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Deadlock and Starvation

Blog banner

Music is life

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Virtual memory

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Deadlock and Starvation

Blog banner

Virtual memory

Blog banner

Threading

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Travelling blog

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

note taker app

Blog banner

Confidence Building Activities for the New School Year

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Uniprocessor and Types

Blog banner

Crypto tax evasion

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

SNAPCHAT

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

A True Friendship

Blog banner

Process states

Blog banner

COMMUNICATION

Blog banner

Cache memory

Blog banner

The Laws of Karma

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Zoho

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

INTRANET

Blog banner

Phishing

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Mumbai famous street food

Blog banner

Fitness

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner