State in brief about virtual memory, Computer Engineering

Assignment Help:

What is Virtual memory

The term virtual memory signifies something that appears to be present though actually it is not. Virtual memory technique enables users to use more memory for a program than real memory of a computer. A programmer can write a program that requires more memory space than capacity of the main memory. Such a program is executed by virtual memory technique. Program is stored in the secondary memory. Memory management unit (MMU) transfers currently required part of the program from the secondary memory to main memory for execution. This part of program is executed by the processor. After execution this part of program is sent back to the secondary memory together with immediate results. Afterwards CPU takes another part of the program for execution. So the main memory always keeps only currently needed part of the program. This type of 'to and from' movement instructions and data between main memory and secondary memory is termed as swapping. So a program requiring more memory space than capacity of the main memory can executed employing a swapping technique. This concept is called virtual memory technique.

 


Related Discussions:- State in brief about virtual memory

What is non-volatile bios, Nonvolatile BIOS memory refers to a small memory...

Nonvolatile BIOS memory refers to a small memory on PC motherboards that is used to kept BIOS settings. It was traditionally known as CMOS RAM because it used a volatile, low-power

Determine the workarounds in multiple inheritances, What are several issues...

What are several issues for selecting best workarounds in multiple inheritances? Some restrictions methods are used. Use two approaches of delegations, which is an implementati

Array to be sorted is partitioned again and again, The sorting method where...

The sorting method where array to be sorted is partitioned again and again in such a way that all elements less than or equivalent to partitioning element appear before it and thos

Print a prompt, When your shell is waiting for input from the user, it shou...

When your shell is waiting for input from the user, it should first print a prompt. The prompt should consist of the current working directory followed by the _>_ character. Here i

Fingerprint- biometric computer security systems, Fingerprint- Biometric co...

Fingerprint- Biometric computer security systems First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and the

Which technique is an encryption technique, Which technique is an encryptio...

Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.

Explain complex instruction set computer, CISC (Complex Instruction Set Com...

CISC (Complex Instruction Set Computer) CISC stands for Complex Instruction Set Computer. If the control unit having a number of micro-electronic circuitry to make a set of con

What are the barcode readers, What are the Barcode readers These collec...

What are the Barcode readers These collect data from printed barcodes and allow automatic stock control in, for illustration, supermarkets.

Limitations of execution of instructions, Q. Limitations of execution of in...

Q. Limitations of execution of instructions? 1. Size of memory shown in 16 words while instruction is capable of addressing 210 =1 K words of Memory. However why 210 since 10 b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd