wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
77 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

Risk factors in service transistion

Blog banner

INTERNET

Blog banner

Metasploit

Blog banner

Disk cache

Blog banner

Wiretapping

Blog banner

Explain website hacking issues

Blog banner

Answer

Blog banner

Retiring ISS

Blog banner

Developments in Modern Operating Systems

Blog banner

Operating Systems

Blog banner

SAVE TREES

Blog banner

What is Spyware?

Blog banner

Threads

Blog banner

Mobile Survey

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

LinkedIn

Blog banner

File Allocation Methods

Blog banner

Understanding E-mail Servers

Blog banner

Explain Multiprocessors

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Health is Wealth

Blog banner

What is process

Blog banner

Sessions In OS.

Blog banner

INSTAGRAM

Blog banner

DBMS and various career options related to it.

Blog banner

Capacity management in ITSM

Blog banner

Virtual Machine

Blog banner

HubSpot

Blog banner

Consumer to consumer business mode

Blog banner

Be you

Blog banner

Cache Memory in Operating Systems

Blog banner

Hey Aryan here

Blog banner

Music is life

Blog banner

Linux 94

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

THE ACTORS LIFE

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Mumbai Metro 3

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Esri India launches Policy Maps.

Blog banner