wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory in Operating System

profile
Heet Chothani
Jul 04, 2024
0 Likes
0 Discussions
117 Reads

Virtual memory is nothing but the computer's expandable workspace which allows it to use it's disk storage as an additional RAM. It allows programs to address memory from the logical point of view. (In short aisi memory joh physically available nahi hai lekin computer ke disk storage ko as an additional RAM use kiya jaata hai). Virtual Memory allows the system to compensate for physical memory shortages, which helps the larger applications to run on the systems with less Random Access Memory. ( Virtual memory system ko allow karta hai physical memory ko as a RAM use karne ke liye jisse bade bade applications easily system pe run ho jaaye woh bhi less RAM usage ke saath). Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory i.e RAM is limited. (Virtual memory ek aisi memory management technique hai joh operating systems use karte hai large and continuous block of memory aur large applications ko run karne ke liye even if joh physical memory yaani RAM limited ho). A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. (Virtual memory ek illusion hai woh virtual hai real nahi aur woh real memory se badi hoti hai). We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. (Virtual memory ka allocation noncontiguous tareeke se hota hai yaani memory randomly kahi bhi allocate hogi aur woh sequence mai nahi hogi). The virtual memory manager removes some components from memory to make room for other components. (Virtual memory manager kuch cheezo ko kuch components ko remove karte hai taaki dusre components ke liye jagah ban sake).


Comments ()


Sign in

Read Next

Install Ubuntu in Vmware

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Memory managment

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Deadlock

Blog banner

Recipe of Paneer Butter Masala

Blog banner

UniProcessor Scheduling

Blog banner

Security in Operating Systems

Blog banner

K-means use cases

Blog banner

All you need to know about Cassandra

Blog banner

Interrupts in OS

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

How Cyber Forensics use in AI

Blog banner

Data Visualization

Blog banner

Man VS Nature

Blog banner

Types of Threads

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

BharatPe

Blog banner

Note on Process, Process creation and Process termination

Blog banner

objectives and functions of operating system

Blog banner

Record Blocking

Blog banner

Service Design Model

Blog banner

NETSUITE

Blog banner

Importance of education

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

RAID

Blog banner

PERT Overview

Blog banner

Importance of Education

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Different types of scam Fraud

Blog banner

Deadlock

Blog banner

Cyber Laws In India and Around the World

Blog banner

Disk Scheduling

Blog banner

Types of Threads

Blog banner

On-Page SEO

Blog banner

In the world of Technology...

Blog banner

Scheduling

Blog banner

Memory Management

Blog banner

Deadlock in operating system

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner