Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Virtual memory:
Virtual memory is a technique which realized an application program the idea that it has contiguous working memory (an address space), whereas in fact it may be physically fragmented and can even overflow on to disk storage.
Virtual memory provides 2 main functions:
1. Each process sees one contiguous block of free memory upon launch. Fragmentation remains hidden.
2. Each process has its own address space, thereby not needed to be relocated nor need to use relative addressing mode.
All of the implementations (Excluding emulators) need hardware support. It is typically in the form of a Memory Management Unit make into the CPU.
The systems, which is use virtual memory technique make programming of large applications simpler and use real physical memory (for example: RAM) more efficiently than those without virtual memory. Virtual memory differs notably from memory virtualization in that virtual memory permit resources to be virtualized as memory for a particular system, as opposed to a big pool of memory being virtualized as smaller pools for various different systems.
Note that "virtual memory" is more than just "utilizing disk space to extend physical memory size" - that is just the extension of the memory hierarchy to include hard disk drives. Extending memory to disk is a typical consequence of utilizing virtual memory techniques, but could be complete by other means such as overlays or swapping programs and their data fully out to disk whereas they are inactive. Definition of "virtual memory" is based on redefining the address space with a contiguous virtual memory addresses to "trick" programs into thinking they are utilizing large blocks of contiguous addresses.
Q Explain Instruction cycle and Execution cycle. and also explain Instruction Counter, Memory Address Register and Memory Buffer Register.
What is guard bits? Guard bits are extra bits which are produced while the intermediate steps to yield maximum accuracy in the final results.
What is semaphores? A semaphore 'S' is a synchronization tool which is an integer value that, apart from initialization, is accessed only by two standard atomic operations; wa
i want the matlab code for the following events 1. face detection 2. video to frame conversion 3.video shot boundary detection
Design a circuit for determining the 9's compliment of a BCD number by using 4-bit binary adder and some external logic gates? Compliment of a BCD number 9's co
Explain the working of Interpreter? The Interpreter is a program that executes instructions written in a high-level language. There are two manners to run programs written in a
how many errors will be left after defect amplification and removal method on the following data design=40 analysis=30 maintenance=20 testing 35 coding 25 take 75% removal efficie
Q. Explain about Synchronous DRAM? One of the most broadly used forms of DRAM is synchronous DRAM (SDRAM). Unlike the conventional DRAM that is asynchronous SDRAM exchanges dat
state function and path function
How do you create special files like named pipes and device files? The system call method forms special files in the following sequence. Kernel assigns new inode,
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd