wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Virtual Memory

profile
Prithika Burmon
Aug 15, 2024
0 Likes
0 Discussions
68 Reads
  1. Virtual Memory is a capacity assignment conspire in which auxiliary memory can be tended to as in spite of the fact that it were portion of the fundamental memory.
  2. A virtual memory is what its title demonstrates- it is an figment of a memory that is bigger than the genuine memory. We allude to the program component of virtual memory as a virtual memory chief. The premise of virtual memory is the noncontiguous memory allotment demonstrate.
  3. The virtual memory director expels a few components from memory to make room for other components.


Types of Virtual Memory


  • Paging

Paging separates memory into little fixed-size squares called pages. When the computer runs out of Smash, pages that aren't right now in utilize are moved to the difficult drive, into an region called a swap record. The swap record acts as an expansion of Smash. When a page is required once more, it is swapped back into Slam, a prepare known as page swapping. This guarantees that the working framework (OS) and applications have sufficient memory to run.


  • Segmentation

Segmentation partitions virtual memory into portions of diverse sizes. Portions that aren't as of now required can be moved to the difficult drive. The framework employments a portion table to keep track of each segment's status, counting whether it's in memory, if it's been adjusted, and its physical address. Sections are mapped into a process's address space as it were when needed.


Comments ()


Sign in

Read Next

OLA

Blog banner

Threat management

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Types of Threads

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Cloud Security: Trends and Innovations

Blog banner

OS Assignment-3

Blog banner

Memory Management

Blog banner

Data Visualization in Decision-Making

Blog banner

Process Description

Blog banner

Facebook marketing

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Understanding Regression Analysis

Blog banner

Consumer to consumer business mode

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

VPN

Blog banner

SPAM

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Risk mitigation and management

Blog banner

Kernel in Operating System

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Chicken Dum Biryani

Blog banner

Deadlock

Blog banner

NIKE

Blog banner

Operating System Objectives and Functions

Blog banner

Time Series Analysis

Blog banner

Number Guessing game --lisp

Blog banner

Is Your Password Complex Enough?

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Types of Threads

Blog banner

Data Structures

Blog banner

Music

Blog banner

child Labour

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

LINUX

Blog banner

Metasploit

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Security Issues

Blog banner

Session Vulnerabilities

Blog banner