Any method for controlling access to or use of memory is known
a. Memory map
b. Memory protection
c. Memory management
d. Memory instruction

1 Answer

Answer :

Memory protection

Related questions

Description : Any method for controlling access to or use of memory is known A) Memory map B) Memory protection C) Memory management D) Memory instruction

Last Answer : Answer : B

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : b. Memory protection

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : b. Memory protection

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : The simplest method of controlling sequence of instruction execution is to have each instruction explicitly specify: a. The address of next instruction to be run b. Address of previous instruction c. Both a &b d. None of these

Last Answer : a. The address of next instruction to be run

Description : Which of the following registers is used to keep track of address of the memory location where the next instruction is located? a. Memory address register b. Memory data register c. Instruction register d. Program counter

Last Answer : Program counter

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter

Last Answer : Instruction register

Description : A method of implementing a memory management system is a. Buddy system b. Bridgeware c. Broadband coaxial system d. All of the above

Last Answer : Buddy system

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : Address register

Description : a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer c. Micro computer d. Macro computer

Last Answer : Super computer

Description : a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer c. Micro computer d. Macro computer

Last Answer : Super computer

Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control

Last Answer : Media Access Control

Description : Which of the following memories has the shortest access times? a. Cache memory b. Magnetic bubble memory c. Magnetic core memory d. RAM

Last Answer : Cache memory

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called a. Preamble b. Postamble c. Jam d. None of the above

Last Answer : c. Jam

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : On what method search in cache memory used by the system. a. Cache directing b. Cache mapping c. Cache controlling d. Cache invalidation

Last Answer : b. Cache mapping

Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above

Last Answer : TDD-TDMA

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above

Last Answer : CSMA/CA

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization

Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above

Last Answer : MAC

Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above

Last Answer : 1-persistent

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : What is the name of the softwarepackage that allows peopleto sendelectronic mail along anetworkof computers and workstations? A. Memory residentpackage B. Project management package C. Data communication package D. Electronic mail package E. None of the above

Last Answer : Data communication package

Description : Which operation is not performed by computer a. Inputting b. Processing c. Controlling d. Understanding

Last Answer : Understanding

Description : _______ inthe data link layer separates a message from one source toa destination, or from other messages going from other sources to other destinations. A) Digitizing B) Controlling C) Framing D) none of the above

Last Answer : Framing

Description : Which statement is valid about interpreter? a. It translates one instruction at a time b. Object code is saved for future use c. Repeated interpretation is not necessary d. All of above

Last Answer : It translates one instruction at a time

Description : A compiler is a translating program which a. Translates instruction of a high level language into machine language b. Translates entire source program into machine language program c. It is not involved in program’s execution d. All of above

Last Answer : All of above

Description : Instruction in computer languages consists of a. OPCODE b. OPERAND c. Both of above d. None of above

Last Answer : Both of above

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : The disk drive component used to position read/write heads over a specific track I known as a. Acoustic couples b. Access arm c. Cluster d. All of the above

Last Answer : Access arm

Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above

Last Answer : BSS

Description : The load instruction is mostly used to designate a transfer from memory to a processor register known as_________ A. Accumulator B. Instruction Register C. Program counter D. Memory address Register

Last Answer : A. Accumulator

Description : The register which holds the address of the location to or from which data are to be transferred is known as_______ A. Instruction Register B. Control register C. Memory Address Register D. None of the Above

Last Answer : C. Memory Address Register

Description : Copy of instruction in cache memory is known as: a Execution cache b. Data cache c. Instruction cache d. Allof these

Last Answer : c. Instruction cache

Description : The register which keeps track of the execution of a program and which contains the memory address of the instruction currently being executed is known as: a) Index Register b) Memory Address Register c) Program Counter d) None of The Above

Last Answer : c) Program Counter

Description : In ________APS, there is only one protection line for many workinglines. When afailure occurs in oneof the working lines, the protectionline takes control until the failedline is repaired. A) one-plus-one B) one-to-one C) one-to-many D) none of the above

Last Answer : one-to-many

Description : . In ______ APS, there is one working line and one protection line. Thedata arenormally senton the working line until it fails. A) one-plus-one B) one-to-one C) one-to-many D) none of the above

Last Answer : one-to-one

Description : In ________ APS, there arenormally two lines: one workingline andone protection line. Bothlines areactive all the time. A) one-plus-one B) one-to-one C) one-to-many D) none of the above

Last Answer : one-plus-one

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : Use of radio for higher education is based on the presumption of: (A) Enriching curriculum based instruction (B) Replacing teacher in the long run (C) Everybody having access to a radio set (D) Other means of instruction getting outdated

Last Answer : Answer: A Intrapersonal communication made some argue that this definition is too narrow but to some extent it is also communication since there is an exchange of message within oneself. Intrapersonal ... mind of the individual in a model which contains a sender, receiver, and feedback loop.

Description : How do I get access to my phone's instruction manual?

Last Answer : Here you go. (I’ve had to look up many manuals I’ve lost over the years. I just google ” manual”, and it usually finds it for me.)

Description : BASIC stands for: a) Basic Access towards Skills in Computer b) Beginner's All Purpose Symbolic Instruction Code c) Binary And Specific Instruction Code d) None of These

Last Answer : b) Beginner's All Purpose Symbolic Instruction Code

Description : The simultaneous execution of two or more instructions is called- 1) Sequential Access 2) Reduced Instruction set computing 3) Multiprocessing 4) None of these

Last Answer : 3) Multiprocessing

Description : Which of the following is a way to access secondary memory? A) Random access memory B) Action method C) Transfer method D) Density method

Last Answer : Answer : A

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : a. Random access memory

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method

Last Answer : a. Random access memory