wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
Dhruvi Bhatt
Aug 15, 2024
0 Likes
0 Discussions
29 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Odoo

Blog banner

Virtual Memory

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

What is OS Fingerprinting?

Blog banner

"Life as a Part-time Student"

Blog banner

Raid

Blog banner

10 Problems you face if you are an Otaku

Blog banner

The application udemy

Blog banner

Apache Kafka

Blog banner

Evolution of Operating system

Blog banner

Cache Memory

Blog banner

Retiring ISS

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Data Visualization in Decision-Making

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

security requirements for safe e-payment

Blog banner

Trello ( management software)

Blog banner

All you need to know about Website Traffic

Blog banner

Bit Coins

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

What is semaphore in operating system?

Blog banner

Gamer life

Blog banner

Memory management

Blog banner

SQL Injection

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Explain DBMS in Brief

Blog banner

RAID

Blog banner

OS Assignment 1

Blog banner

Hey Aryan here

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

OPERATING SYSTEM

Blog banner

Starvation

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Memory management

Blog banner

Importance Of Blockchain

Blog banner

Excel records

Blog banner

Security issues

Blog banner

Starting Android Activity Using Intent

Blog banner

File Systems in OS.

Blog banner

Wedding photographer

Blog banner

Paid Email

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner