With virtual memory, when a program requests memory,the memory management system does which of the following? Select one: A. It grants the request as long as there is enough physical memory to accommodate B. It looks up the address in the page table. If the address is in memory, then it grants the request. C. It looks up the address in the page table. If the address is in memory, it grants the request. If the address is stored to disk, it writes a section of memory to disk and then transfers the requested virtual memory address from disk to main memory. D. It causes a deadlock to occur
With virtual memory, when a program requests memory,the memory management system does which of the following? Select one: A. It grants the request as long as there is enough physical memory to accommodate B. It looks up the address in the page table. If the address is in memory, then it grants the request. C. It looks up the address in the page table. If the address is in memory, it grants the request. If the address is stored to disk, it writes a section of memory to disk and then transfers the requested virtual memory address from disk to main memory. D. It causes a deadlock to occur
Chapter11: Operating Systems
Section: Chapter Questions
Problem 29VE
Related questions
Question
With virtual memory, when a program requests memory,the memory management system does which of the following?
Select one:
A.
It grants the request as long as there is enough physical memory to accommodate
B.
It looks up the address in the page table. If the address is in memory, then it grants the request.
C.
It looks up the address in the page table. If the address is in memory, it grants the request. If the address is stored to disk, it writes a section of memory to disk and then transfers the requested virtual memory address from disk to main memory.
D.
It causes a deadlock to occur.
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![EBK JAVA PROGRAMMING](https://www.bartleby.com/isbn_cover_images/9781337671385/9781337671385_smallCoverImage.jpg)
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT