Which of the following is a way to access secondary memory?
a. Random access memory
b. Action method
c. Transfer method
d. Density method

1 Answer

Answer :

Random access memory

Related questions

Description : Which of the following is a way to access secondary memory? A) Random access memory B) Action method C) Transfer method D) Density method

Last Answer : Answer : A

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : a. Random access memory

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method

Last Answer : a. Random access memory

Description : The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above

Last Answer : ROM and RAM

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization

Description : Technique of using disk space to make programs believe that the system contains more Random Access Memory(RAM) than is actually available is called ______ A. Random Access Memory B. Primary Memory C. Secondary Memory D. Virtual Memory

Last Answer : D. Virtual Memory

Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above

Last Answer : A. Random Access Memory

Description : Random Access Memory (RAM), a form of computer storage, is a ............. memory. (A) Non-volatile (B) Volatile (C) Permanent (D) Secondary

Last Answer : Answer: B

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : Memory protection

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : As compared to the secondary memory, the primary memory of a computer is a. Large b. Cheap c. Fast d. Slow

Last Answer : Fast

Description : The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called a. Duping b. Booting c. Padding d. CPS

Last Answer : Booting

Description : Which of the following is a secondary memory device? a. Keyboard b. Disk c. ALU d. All of the above

Last Answer : Disk

Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control

Last Answer : Media Access Control

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : Address register

Description : Which of the following memories has the shortest access times? a. Cache memory b. Magnetic bubble memory c. Magnetic core memory d. RAM

Last Answer : Cache memory

Description : The two kinds of main memory are: A) Primary and secondary B) Random and sequential C) ROM and RAM D) All of above

Last Answer : Answer : C

Description : The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above

Last Answer : c. ROM and RAM

Description : The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above

Last Answer : c. ROM and RAM

Description : In Random Access Memory if current will be interrupted, data will not lost. -Technology

Last Answer : FalseRandom Access Memory (RAM) is a volatile memory, if current is interrupted, data will lost.

Description : Random Access Memory and Read Only Memory are examples of ____________. -Technology

Last Answer : Random Access Memory and Read Only Memory are examples ofPrimary Memory.

Description : What is random access memory ?

Last Answer : Random Access Memory ( RAM) RAM is a type of medium that stores computer data. Any type of data can be "accessed" from RAM , hence it is called random access memory. The term random refers ... for backup. RAM is small in terms of its physical size and the amount of information it contains.

Description : The instructions for starting the computer are house on A) Random access memory B) CD-Rom C) Read only memory chip D) All of above

Last Answer : Answer : C

Description : The first practical form of Random Access Memory was the __________ a) SSEM b) Cathode Ray Tube c) William’s Tube d) Thomas’s Tube

Last Answer : Answer: c Explanation: The first practical form of RAM was the William’s Tube made in 1947. It stored data as electrically charged spots on the face of a Cathode Ray Tube

Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage

Last Answer : B. Random Access Memory

Description : SDRAM stands for. a. System dynamic random access memory b. Synchronous dynamic random access memory c. Both d. None

Last Answer : b. Synchronous dynamic random access memory

Description : RAM stands for: a) Read Access Memory b) Random Access Memory c) Rewritable Access Memory d) None of These

Last Answer : b) Random Access Memory

Description : What should be minimum requirement of random access memory (RAM) for internet access: a) 8 MB b) 16 MB c) 32 MB d) 64 MB

Last Answer : c) 32 MB

Description : Separate Read/Write heads are required in which of these memory access schemes. 1) Random Access 2) Sequential Access 3) Direct Access 4) None of these

Last Answer : 4) None of these

Description : Separate Read/Write heads are required in which of these memory access schemes. 1 Random Access 2 Sequential Access 3 Direct Access 4 None of these

Last Answer : 4 None of these

Description : What is another name for random-access memory (RAM)?

Last Answer : Read/write memory.

Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip

Last Answer : c. Read only memory chip

Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip d. All of above

Last Answer : c. Read only memory chip

Description : .............. is a type of memory circuitry that holds the computer’s start-up routine. (A) RIM (Read Initial Memory) (B) RAM (Random Access Memory) (C) ROM (Read Only Memory) (D) Cache Memory 

Last Answer : (C) ROM (Read Only Memory) 

Description : RAM means: (A) Random Access Memory (B) Rigid Access Memory (C) Rapid Access Memory (D) Revolving Access Memory

Last Answer : (A) Random Access Memory

Description : Which of the following is used for very high speed searching applications ? (1) Flash Memory (2) Content-addressable Memory (3) Dynamic Random Access Memory (4) Static Random Access Memory

Last Answer : Content-addressable Memory

Description : Which component is mainly responsible for doing calculation in computer ? (1) Random access memory (2) Control unit (3) Arithmetic logic unit (4) Hard disk

Last Answer : ALU (Arithmetic logic unit)

Description : In a computer, what does RAM stand for ? (1) Ready to Access Memory (2) Read At-a-time Memory (3) Random Access Memory (4) Readily Available Memory

Last Answer :  Random Access Memory

Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above

Last Answer : TDD-TDMA

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above

Last Answer : CSMA/CA

Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above

Last Answer : MAC