wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Modern Operating Systems.

Blog banner

Gis in agriculture and farming

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Photography

Blog banner

SQL Injection

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Components of GIS

Blog banner

semaphores

Blog banner

10 Types of Friends in every friend group

Blog banner

Multicore and Multithreading

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Types of Malware in Cyber Security

Blog banner

BharatPe

Blog banner

Synchronization

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Benefits and drawback of web security.

Blog banner

Virtual Machine

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Steganography and Steganalysis

Blog banner

Virtual memory

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Swiggi

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Concurrency and memory

Blog banner

What your Favorite colour says about You?

Blog banner

Memory Management

Blog banner

INTERNET SECURITY

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

DATA VAULT

Blog banner

Remote Work in 2026

Blog banner

SPEM

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Risk factors in service transistion

Blog banner

TRELLO

Blog banner

Indian Food

Blog banner

Tracking Emails & Email Crimes

Blog banner

Busted : Common Web Security Myths

Blog banner