Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is Virtual memory
The term virtual memory signifies something that appears to be present though actually it is not. Virtual memory technique enables users to use more memory for a program than real memory of a computer. A programmer can write a program that requires more memory space than capacity of the main memory. Such a program is executed by virtual memory technique. Program is stored in the secondary memory. Memory management unit (MMU) transfers currently required part of the program from the secondary memory to main memory for execution. This part of program is executed by the processor. After execution this part of program is sent back to the secondary memory together with immediate results. Afterwards CPU takes another part of the program for execution. So the main memory always keeps only currently needed part of the program. This type of 'to and from' movement instructions and data between main memory and secondary memory is termed as swapping. So a program requiring more memory space than capacity of the main memory can executed employing a swapping technique. This concept is called virtual memory technique.
i want to make final year project in wireless.please help me to decide the topic???????
Memory utilization factor shall be computed as? Ans. memory in use/total memory connected.
How will this difference b interpreted? When one pointer is subtracted from another pointer, the number of elements between the two pointers always includes the element pointed
Q. Benefits of traditional hard disks and CD-ROM? CD-ROM is suitable for distribution of large amounts of data to a large number of users. CD-ROMs are a general medium these da
Q. What is Parallel Balance Point? In order to execute parallel algorithm on parallel computer K processors are necessary. It should be noted that given input is allocated to
What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e
? Nodes: A node shows any hardware component. The configuration of hardware is shown by attributes of nodes. ? Components: A component shows software. Every component straight
How do you make an image clickable in HTML? Give an example. To create an image or text clickable hyperlinks are used, that use the and tags. Such tag has different paramet
Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wire
Q. What you mean by organizational effectiveness? Organizational effectiveness is measured in terms of productivity, structural flexibility, Employee involvement and Job satisf
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd