wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Deadlock and Starvation

Blog banner

Direct memory access

Blog banner

Multicore and Multithreading

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Fitness regime by Deepesh

Blog banner

SMARTSHEET

Blog banner

History of Money

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Be you

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Beauty of indian railway

Blog banner

Cache memory

Blog banner

Deadlock in Operating systems

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Women Empowerment

Blog banner

Wedding photographer

Blog banner

MEMORY HIERARCHY

Blog banner

Smartsheet

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Memory hierarchy

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

TRAIN TRAVELING

Blog banner

Jira service Management

Blog banner

John Titor: The Time Traveler

Blog banner

Cloud Security: Trends and Innovations

Blog banner

How to insert contacts in zoho crm using php

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

How Does SSO Works

Blog banner

Online Education

Blog banner

GIS in Disaster Management

Blog banner

All you need to know about Website Traffic

Blog banner

Mesh Topology

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Life of a 2020-2021 student

Blog banner

Depression

Blog banner

Threads

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner