wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Electronic Evidence in Cyber Forensics

Blog banner

Esri India launches Policy Maps.

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Data Security must be your Priority!

Blog banner

Gamer life

Blog banner

What is Data, Information and Knowledge?

Blog banner

Process in OS

Blog banner

Threads

Blog banner

I/O Management and Disk Scheduling

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Raid

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Process State

Blog banner

Deadlock

Blog banner

Uber

Blog banner

Broken Authentication Attacks

Blog banner

Deadlock in operating system

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

What is Network Security?

Blog banner

Introduction to GIS

Blog banner

Hacking of web server and application

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Linux -V Server Virtual Machine

Blog banner

IP Address

Blog banner

Password Generator - Lisp

Blog banner

Direct memory access (DMA)

Blog banner

Quality check in IT services

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

File Allocation Methods

Blog banner

10 Interesting Facts about Death Note

Blog banner

Race Condition

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Memory management

Blog banner

LIMITED EDITION

Blog banner

38_Exploring The Honeynet Project

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Indian Culture and Tradition

Blog banner