Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
The virtual memory is the space seen from a process.
This can particularly happen where the computer uses virtual memory.
The operating system used virtual memory to provide a large address space.
The virtual memory was simpler than used in later systems.
Sure enough, virtual memory had been left on from a forgotten previous project.
Two additional states are available for processes in systems that support virtual memory.
It added virtual memory in support of the new System/370 series hardware.
Each program thus appears to have sole access to the virtual memory.
Therefore virtual memory concept is not used in embedded systems.
The amount of hard drive space you allocate for virtual memory is important.
The quality of the virtual memory manager can have an extensive effect on overall system performance.
Users outside computer science usually call this cache virtual memory.
Next, we'll look at how to configure virtual memory on a computer.
Windows 98 is an example of a typical operating system that has virtual memory.
Chances are good that your operating system includes virtual memory.
This prototype design was a 24-bit implementation without virtual memory.
And even then there might be problems with some models that cannot take advantage of certain features, like virtual memory.
The result was the GE-645, which included support for virtual memory.
Virtual memory is a common part of most operating systems on desktop computers.
Most modern operating systems that support virtual memory also run each process in its own dedicated address space.
Some applications enjoy having lots of virtual memory space but do not access it very much.
There was no support for virtual memory or demand paging.
Virtual memory is real, it just isn't quite what it seems.
The main benefit of the 030 processor was the ability to use System 7's virtual memory feature.
It has also been known to write to another process' virtual memory (process hijacking).