wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Indian Food

Blog banner

MEMORY MANAGEMENT

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Blog name

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

E-mail security

Blog banner

Functions Of Operating Systems

Blog banner

Scheduling

Blog banner

USPS mail

Blog banner

Modern OS

Blog banner

Paid Email

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Uniprocessor scheduling

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Save Girl Child

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Education: Key to your Prosperity

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Stop Racism

Blog banner

Real time scheduling

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Electronic Funds Transfer

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Risk management in IT

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

How can parents support a child’s mental health?

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Understanding E-mail Servers

Blog banner

Cyber Security in Data Breaching

Blog banner

Direct Memory Access

Blog banner

Traveling

Blog banner

How to feel Happy everyday day

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

S-Tool : Steganography

Blog banner

Jira Software

Blog banner

RAID

Blog banner

MySQL

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner