wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory in Operating System

profile
Heet Chothani
Jul 04, 2024
0 Likes
0 Discussions
118 Reads

Virtual memory is nothing but the computer's expandable workspace which allows it to use it's disk storage as an additional RAM. It allows programs to address memory from the logical point of view. (In short aisi memory joh physically available nahi hai lekin computer ke disk storage ko as an additional RAM use kiya jaata hai). Virtual Memory allows the system to compensate for physical memory shortages, which helps the larger applications to run on the systems with less Random Access Memory. ( Virtual memory system ko allow karta hai physical memory ko as a RAM use karne ke liye jisse bade bade applications easily system pe run ho jaaye woh bhi less RAM usage ke saath). Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory i.e RAM is limited. (Virtual memory ek aisi memory management technique hai joh operating systems use karte hai large and continuous block of memory aur large applications ko run karne ke liye even if joh physical memory yaani RAM limited ho). A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. (Virtual memory ek illusion hai woh virtual hai real nahi aur woh real memory se badi hoti hai). We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. (Virtual memory ka allocation noncontiguous tareeke se hota hai yaani memory randomly kahi bhi allocate hogi aur woh sequence mai nahi hogi). The virtual memory manager removes some components from memory to make room for other components. (Virtual memory manager kuch cheezo ko kuch components ko remove karte hai taaki dusre components ke liye jagah ban sake).


Comments ()


Sign in

Read Next

Memory Management

Blog banner

Deadlock

Blog banner

Article on IT development trends

Blog banner

DIGITAL ECONOMY

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Constrains in service design

Blog banner

Direct Memory Access

Blog banner

What is Spyware?

Blog banner

Online Education

Blog banner

Memory management

Blog banner

Deadlock

Blog banner

Teenagers of Today

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Different types of scam Fraud

Blog banner

Google classroom

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Phishing

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

computer security

Blog banner

Deadlock and starvation

Blog banner

Time Series Analysis

Blog banner

Mumbai

Blog banner

Malware Defense

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

DATA WRANGLING

Blog banner

File management

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner

Assignment-3

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

VIRUS

Blog banner

IOT- Internet Of Things

Blog banner

GOOGLE

Blog banner

How To Secure Operating Systems ?

Blog banner

Virtual Memory

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Operating Systems

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Photorec - media recovery tool

Blog banner

Privacy in Social Media and Online Services

Blog banner