wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Virtual Machine

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

What is OS and its overview

Blog banner

Social Engineering

Blog banner

SESSION HIJACKING

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

E-security systems | CCTV

Blog banner

Difference Between Classification And Clustering

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

I/O Management and Disk Scheduling

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

10 Reasons to date your best friend

Blog banner

10 Problems you face if you are an Otaku

Blog banner

?What Children Learn Between Activities: The Hidden Learning Moments in a Preschool Day

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Memory management

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Twisted world

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Race condition

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Health and fitness in technology

Blog banner

Gis in agriculture and farming

Blog banner

Importance of internet

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Memory Management

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Social Media.

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Natural Language Processing(NLP)

Blog banner