wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual memory

profile
F—17 Niraj shav
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of the main memory. The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify physical storage sites and program-generated addresses are translated automatically to the corresponding machine addresses.


What is Virtual Memory?

Virtual memory is a memory management technique used by operating systems to give the appearance of a large, continuous block of memory to applications, even if the physical memory (RAM) is limited. It allows the system to compensate for physical memory shortages, enabling larger applications to run on systems with less RAM.


A memory hierarchy, consisting of a computer system’s memory and a disk, enables a process to operate with only some portions of its address space in memory. A virtual memory is what its name indicates- it is an illusion of a memory that is larger than the real memory. We refer to the software component of virtual memory as a virtual memory manager. The basis of virtual memory is the noncontiguous memory allocation model. The virtual memory manager removes some components from memory to make room for other components.


The size of virtual storage is limited by the addressing scheme of the computer system and the amount of secondary memory available not by the actual number of main storage locations.


Comments ()


Sign in

Read Next

E-mail security

Blog banner

"Mahakali cave"

Blog banner

OS Assignment 1

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

IoT Architecture Based Security

Blog banner

Social Media Marketing Trends 2022

Blog banner

Education: Key to your Prosperity

Blog banner

Go Daddy

Blog banner

Deadlock and starvation

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

memory managment

Blog banner

Steganography

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Memory Management

Blog banner

Teenagers of Today

Blog banner

Security issues

Blog banner

Importance of Network Security Risk

Blog banner

EdTech (Education Technology)

Blog banner

Virtual Memory

Blog banner

File system

Blog banner

To-Do List In LISP

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Types Of Interrupt

Blog banner

Electronic Funds Transfer

Blog banner

Social Engineering Attacks

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Privacy in Social Media and Online Services

Blog banner

VIRTUAL MACHINE

Blog banner

What is Internet

Blog banner

Man is free by the birth .

Blog banner

NETWORK SECURITY RISKS

Blog banner

How to feel Happy everyday day

Blog banner

Types Of scheduling

Blog banner

Topic: Sessions in Operating system

Blog banner

Question

Blog banner

Sessions In OS.

Blog banner

Banaras

Blog banner

c

Blog banner

GUIDE TO GIS

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Virtual Memory

Blog banner

Junk food vs healthy food

Blog banner