wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Process in OS

Blog banner

5 Stages of Digital Marketing

Blog banner

Advantage of freedom

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

IoT Architecture Based Security

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Cache Memory in Operating Systems

Blog banner

Different Types of Data

Blog banner

Starvation and Deadlock.

Blog banner

What is service level Agreement?

Blog banner

10 Reasons to date your best friend

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Network Forensics Tools and Techniques

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Im Photographer

Blog banner

Types of E-Commerce

Blog banner

Memory Management in Operating System

Blog banner

Financial Fraud Detection

Blog banner

File management -disha parekh

Blog banner

Artical on FreshBooks

Blog banner

Dekkers Algorithm

Blog banner

Virtual Machine

Blog banner

John Titor: The Time Traveler

Blog banner

Service Strategy In ITSM

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Microsoft powerpoint presentation

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Deadlock

Blog banner

This is my first blog.

Blog banner

Operating system evolution

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Short note on Microsoft office

Blog banner

Dal Bafla Recipe

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Importance of self defence for girls

Blog banner

Multiprocessor and Multicore Organization

Blog banner

MOBILE DEVICE FORENSIC

Blog banner