wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory in Operating System

profile
Heet Chothani
Jul 04, 2024
0 Likes
0 Discussions
117 Reads

Virtual memory is nothing but the computer's expandable workspace which allows it to use it's disk storage as an additional RAM. It allows programs to address memory from the logical point of view. (In short aisi memory joh physically available nahi hai lekin computer ke disk storage ko as an additional RAM use kiya jaata hai). Virtual Memory allows the system to compensate for physical memory shortages, which helps the larger applications to run on the systems with less Random Access Memory. ( Virtual memory system ko allow karta hai physical memory ko as a RAM use karne ke liye jisse bade bade applications easily system pe run ho jaaye woh bhi less RAM usage ke saath). Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory i.e RAM is limited. (Virtual memory ek aisi memory management technique hai joh operating systems use karte hai large and continuous block of memory aur large applications ko run karne ke liye even if joh physical memory yaani RAM limited ho). A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. (Virtual memory ek illusion hai woh virtual hai real nahi aur woh real memory se badi hoti hai). We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. (Virtual memory ka allocation noncontiguous tareeke se hota hai yaani memory randomly kahi bhi allocate hogi aur woh sequence mai nahi hogi). The virtual memory manager removes some components from memory to make room for other components. (Virtual memory manager kuch cheezo ko kuch components ko remove karte hai taaki dusre components ke liye jagah ban sake).


Comments ()


Sign in

Read Next

FASHION

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Apple

Blog banner

Mendeley (management software)

Blog banner

TRELLO

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Deadlocks in operating system

Blog banner

E-learning in today's world

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Threads and concurrency

Blog banner

Benefits of Yoga

Blog banner

Concurrency management in operating systems

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Mumbai famous street food

Blog banner

Deadlock and Starvation

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

What is Spyware?

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Deadlocks in Operating System

Blog banner

Full Disk Encryption

Blog banner

indian premier league

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Computer Security

Blog banner

Hacking

Blog banner

Threads

Blog banner

Access management

Blog banner

Concept and definition of m-commerce

Blog banner

"Life as a Part-time Student"

Blog banner

Deadlock and Starvation

Blog banner

SAVE TREES

Blog banner

"Audit" In Data Science

Blog banner

Raid

Blog banner

Development Of Modern Operating System

Blog banner

What your Favorite colour says about You?

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Deadlock and starvation

Blog banner