wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Memory

profile
dhruvi acharya
Aug 15, 2024
0 Likes
0 Discussions
83 Reads



Virtual Memory

Virtual memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

To-Do List In LISP

Blog banner

Virtual Memory

Blog banner

Risk mitigation and management

Blog banner

SPEM

Blog banner

Telegram and it's features

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Bots and Cyber Security

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Study of Sniffing Tools

Blog banner

Business-to-Business

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Steganography and Steganalysis

Blog banner

Deadlock and Starvation

Blog banner

Memory Management

Blog banner

Disk Management

Blog banner

Buffer Overflow

Blog banner

MODERN OPERATING SYSTEM

Blog banner

VIRTUAL MACHINES

Blog banner

Regression Analysis

Blog banner

How to tie a Tie

Blog banner

Save Girl Child

Blog banner

FIREWALL

Blog banner

M commerce

Blog banner

Disk cache

Blog banner

Operating System Objectives and Functions

Blog banner

Inventory management software system

Blog banner

What are Tenders its various types

Blog banner

Europe Through My Lens

Blog banner

Raid

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

File management

Blog banner

Big Data Architecture

Blog banner

AI and Cyber Security

Blog banner

Chicken Dum Biryani

Blog banner

Deadlock

Blog banner

E-security systems | CCTV

Blog banner

Microsoft Word

Blog banner

Deadlock and starvation

Blog banner

Importance of Website

Blog banner