wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Different types of scam Fraud

Blog banner

Ransomware

Blog banner

Virtual Memory

Blog banner

Security Breaches in Stock market trading

Blog banner

Indian Food

Blog banner

Cache Memory

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Deadlock Prevention

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

What is E-commerce

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Install Ubuntu in Vmware

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Blog name

Blog banner

TRIGGERS IN DATABASE

Blog banner

Malicious softwares

Blog banner

Answer

Blog banner

DBMS and various career options related to it.

Blog banner

SNAPCHAT

Blog banner

Go Daddy

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Fault Tolerance

Blog banner

Linux Memory Management

Blog banner

Music is life

Blog banner

Uniprocessor Scheduling

Blog banner

Firewall

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

social media issue

Blog banner

Child labour

Blog banner

Fault Tolerance in an Operating System

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Business Intelligence v/s Big Data

Blog banner

Big Data

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

VIRUS

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

"Audit" In Data Science

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Pipedrive

Blog banner