wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory in Operating System

profile
Heet Chothani
Jul 04, 2024
0 Likes
0 Discussions
118 Reads

Virtual memory is nothing but the computer's expandable workspace which allows it to use it's disk storage as an additional RAM. It allows programs to address memory from the logical point of view. (In short aisi memory joh physically available nahi hai lekin computer ke disk storage ko as an additional RAM use kiya jaata hai). Virtual Memory allows the system to compensate for physical memory shortages, which helps the larger applications to run on the systems with less Random Access Memory. ( Virtual memory system ko allow karta hai physical memory ko as a RAM use karne ke liye jisse bade bade applications easily system pe run ho jaaye woh bhi less RAM usage ke saath). Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory i.e RAM is limited. (Virtual memory ek aisi memory management technique hai joh operating systems use karte hai large and continuous block of memory aur large applications ko run karne ke liye even if joh physical memory yaani RAM limited ho). A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. (Virtual memory ek illusion hai woh virtual hai real nahi aur woh real memory se badi hoti hai). We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. (Virtual memory ka allocation noncontiguous tareeke se hota hai yaani memory randomly kahi bhi allocate hogi aur woh sequence mai nahi hogi). The virtual memory manager removes some components from memory to make room for other components. (Virtual memory manager kuch cheezo ko kuch components ko remove karte hai taaki dusre components ke liye jagah ban sake).


Comments ()


Sign in

Read Next

Be you

Blog banner

ZOHO

Blog banner

What is M-commerce and how it's work

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

THE ACTORS LIFE

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Types of Threads

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Vulnerability Assessment

Blog banner

Importance Of Time

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Operating system and overviews

Blog banner

Zoho

Blog banner

Compromising Mobile Platforms

Blog banner

I/O Buffering

Blog banner

Security requirements for Safe E-Payments

Blog banner

1.1 basic elements

Blog banner

Starvation

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Fault Tolerance in an Operating System

Blog banner

Evolution of Operating system

Blog banner

Number Guessing game --lisp

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Why we fail after giving 100% ?

Blog banner

Answer

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Deadlock and Starvation

Blog banner

Social media

Blog banner

Pandas Matrix Applications

Blog banner

Flipkart

Blog banner

The launch of UniMap by HERE

Blog banner

Linux 94

Blog banner

Security Issues and Countermeasures

Blog banner

Threads

Blog banner

Google App Engine

Blog banner

Fashion design

Blog banner

Deadlock and Starvation

Blog banner

Cache memory

Blog banner

Memory management

Blog banner

Music is life

Blog banner

KASHMIR TRIPS

Blog banner