wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

GOOGLE

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Travelling blog

Blog banner

Virtual Memory

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Challenges and risks in service operations

Blog banner

Yahoo! mail

Blog banner

I/O Buffering

Blog banner

Malware Defense

Blog banner

Memory Management

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Threads

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Session Vulnerabilities

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Privacy in Social Media and Online Services

Blog banner

City of Mumbai (Bombay):

Blog banner

Proof-of-Stake (PoS)

Blog banner

Evolution of operating system

Blog banner

Modern operating system

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Multithreading in Operating System

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Zoho

Blog banner

Social media

Blog banner

TRELLO

Blog banner

Sage business cloud accounting

Blog banner

Deadlock

Blog banner

RAID

Blog banner

Multiprocessor and Multicore Organization

Blog banner

ODOO

Blog banner

Cache memory

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Race condition

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

A small world of Sockets

Blog banner

Incident management in ITSM

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

File management

Blog banner

Power of words

Blog banner

Health and fitness in technology

Blog banner