wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
77 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Introduction my self

Blog banner

Outlook.com

Blog banner

Modern Operating Systems.

Blog banner

Memory Management

Blog banner

File management

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Smitten Kitchen Keepers

Blog banner

My First Dream Bike

Blog banner

Memory Management

Blog banner

Is Your Password Complex Enough?

Blog banner

Zomato (Income Sources)

Blog banner

What is Data, Information and Knowledge?

Blog banner

Earth with no trees

Blog banner

Explain Kernel in OS

Blog banner

Assignment-3

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Vulnerability Assessment

Blog banner

Virus

Blog banner

PODIO

Blog banner

Mail merge

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

History of Money

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Virtual memory in windows

Blog banner

Music

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Blockchain Transactions

Blog banner

Cloud Computing

Blog banner

Os assignment

Blog banner

Threads

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Virtualization

Blog banner

Virtual Machine

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Data Analytics in Data Science

Blog banner

How to Conquer Depression ?

Blog banner

Wiretapping

Blog banner