Any method for controlling access to or use of memory is known A) Memory map B) Memory protection C) Memory management D) Memory instruction

1 Answer

Answer :

Answer : B

Related questions

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : Memory protection

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : b. Memory protection

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : b. Memory protection

Description : The simplest method of controlling sequence of instruction execution is to have each instruction explicitly specify: a. The address of next instruction to be run b. Address of previous instruction c. Both a &b d. None of these

Last Answer : a. The address of next instruction to be run

Description : The load instruction is mostly used to designate a transfer from memory to a processor register known as_________ A. Accumulator B. Instruction Register C. Program counter D. Memory address Register

Last Answer : A. Accumulator

Description : The register which holds the address of the location to or from which data are to be transferred is known as_______ A. Instruction Register B. Control register C. Memory Address Register D. None of the Above

Last Answer : C. Memory Address Register

Description : The register which keeps track of the execution of a program and which contains the memory address of the instruction currently being executed is known as: a) Index Register b) Memory Address Register c) Program Counter d) None of The Above

Last Answer : c) Program Counter

Description : BASIC stands for: a) Basic Access towards Skills in Computer b) Beginner's All Purpose Symbolic Instruction Code c) Binary And Specific Instruction Code d) None of These

Last Answer : b) Beginner's All Purpose Symbolic Instruction Code

Description : The simultaneous execution of two or more instructions is called- 1) Sequential Access 2) Reduced Instruction set computing 3) Multiprocessing 4) None of these

Last Answer : 3) Multiprocessing

Description : Which of the following is a way to access secondary memory? A) Random access memory B) Action method C) Transfer method D) Density method

Last Answer : Answer : A

Description : On what method search in cache memory used by the system. a. Cache directing b. Cache mapping c. Cache controlling d. Cache invalidation

Last Answer : b. Cache mapping

Description : Which of the following registers is used to keep track of address of the memory location where the next instruction is located? A) Memory address register B) Memory data register C) Instruction register D) Program counter

Last Answer : Answer : D

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? A) Memory address registers B) Memory data registers C) Instruction register D) Program counter

Last Answer : Answer : C

Description : Any data and instruction entered in the memory of a computer is__________ A. Storage B. Output C. Input D. Information

Last Answer : C. Input

Description : The decoded instruction is stored in ______ (A) Register (B) Memory Address Register(MAR) (C) Instruction Register(IR) (D) None of the Above

Last Answer : (C) Instruction Register(IR)

Description : Which registers can interact with secondary memory? (A) Register (B) Memory Address Register(MAR) (C) Instruction Register(IR) (D) None of the Above

Last Answer : (B) Memory Address Register(MAR)

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as A) Magnetic core memory B) Magnetic tape memory C) Magnetic disk memory D) Magnetic bubble memory

Last Answer : Answer : D

Description : The magnetic storage chips used to provide non-volatile direct access storage of data and that have no moving parts are known as________ A. Magnetic core memory B. Magnetic tape memory C. Magnetic disk memory D. Magnetic bubble memory

Last Answer : D. Magnetic bubble memory

Description : Copy of instruction in cache memory is known as: a Execution cache b. Data cache c. Instruction cache d. Allof these

Last Answer : c. Instruction cache

Description : The Method of file organisation in which data records in a file are arranged in a specified order according to a key field is known as the1 Direct access method 2) Queuing method 3) Predetermined method 4) Sequential method

Last Answer : 4) Sequential method

Description : Which is not the function of Operating System? a) Virus Protection b) Application Management c) Disk Management d) None of These

Last Answer : a) Virus Protection

Description : Use of radio for higher education is based on the presumption of: (A) Enriching curriculum based instruction (B) Replacing teacher in the long run (C) Everybody having access to a radio set (D) Other means of instruction getting outdated

Last Answer : Answer: A Intrapersonal communication made some argue that this definition is too narrow but to some extent it is also communication since there is an exchange of message within oneself. Intrapersonal ... mind of the individual in a model which contains a sender, receiver, and feedback loop.

Description : How do I get access to my phone's instruction manual?

Last Answer : Here you go. (I’ve had to look up many manuals I’ve lost over the years. I just google ” manual”, and it usually finds it for me.)

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : a. Random access memory

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method

Last Answer : a. Random access memory

Description : During a merger and acquisition transaction, the ability to find and use good comparable data for a valuation is relatively ____________. a) easy because each successful company within an industry ... depth, product diversity and access to lines of credit seldom match the company being valued

Last Answer : d) difficult because size differential, management depth, product diversity and access to lines of credit seldom match the company being valued

Description : A computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as A) Super computer B) Mini computer C) Micro computer D) Macro computer

Last Answer : Answer : A

Description : A group of bits that tell the computer to perform a specific operation is known as_______ A. Instruction code B. Micro-operation C. Accumulator D. Register

Last Answer : A. Instruction code

Description : What is random access memory ?

Last Answer : Random Access Memory ( RAM) RAM is a type of medium that stores computer data. Any type of data can be "accessed" from RAM , hence it is called random access memory. The term random refers ... for backup. RAM is small in terms of its physical size and the amount of information it contains.

Description : Which of the following memories has the shortest access times? A) Cache memory B) Magnetic bubble memory C) Magnetic core memory D) RAM

Last Answer : Answer : A

Description : The contents of information are stored in A) Memory data register B) Memory address register C) Memory arithmetic registers D) Memory access register

Last Answer : Answer : A

Description : The instructions for starting the computer are house on A) Random access memory B) CD-Rom C) Read only memory chip D) All of above

Last Answer : Answer : C

Description : What does DMA stand for? A) Distinct Memory Access B) Direct Memory Access C) Direct Module Access D) Direct Memory Allocation

Last Answer : Answer : B

Description : What does MAR stand for? a) Main Address Register b) Memory Access Register c) Main Accessible Register d) Memory Address Register

Last Answer : Answer: d Explanation: MAR is a type of register which is responsible for the fetch operation. MAR is connected to the address bus and it specifies the address for the read and write operations

Description : The first practical form of Random Access Memory was the __________ a) SSEM b) Cathode Ray Tube c) William’s Tube d) Thomas’s Tube

Last Answer : Answer: c Explanation: The first practical form of RAM was the William’s Tube made in 1947. It stored data as electrically charged spots on the face of a Cathode Ray Tube

Description : Which of the following memories has the shortest access time? A. Cache memory B. Magnetic Bubble Memory C. Magnetic Core Memory D. None of the above

Last Answer : A. Cache memory

Description : Technique of using disk space to make programs believe that the system contains more Random Access Memory(RAM) than is actually available is called ______ A. Random Access Memory B. Primary Memory C. Secondary Memory D. Virtual Memory

Last Answer : D. Virtual Memory

Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above

Last Answer : A. Random Access Memory

Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage

Last Answer : B. Random Access Memory

Description : The average time required to reach a storage location in memory and obtain its contents is called_____. A. Latency time. B. Access time. C. Turnaround time. D. Response time.

Last Answer : B. Access time.

Description : An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as________ A. DDA B. Serial interface C. Direct Memory Access (DMA) D. None of the Above

Last Answer : C. Direct Memory Access (DMA)

Description : The Command to access the memory or the I/O device is carried by ______ A. Address Bus B. Data Bus C. Control Bus D. None of the Above

Last Answer : C. Control Bus

Description : DMA stands for: a) Dial - Up Multiplier Access b) Digital Media Access c) Direct Memory Access d) None of These

Last Answer : c) Direct Memory Access

Description : RAM stands for: a) Read Access Memory b) Random Access Memory c) Rewritable Access Memory d) None of These

Last Answer : b) Random Access Memory

Description : The contents of information are stored in _______: a) Memory Data Register b) Memory Address Register c) Memory Access Register d) Memory Arithmetic Register e) None of The Above

Last Answer : a) Memory Data Register

Description : Critical Region is: a) a set of instructions that access common shared resources which exclude one another in time b) the portion of the main memory which can be accessed only by one process at a time. c) Both of The Above d) None of The Above

Last Answer : a) a set of instructions that access common shared resources which exclude one another in time

Description : DMA stands for: a) Direct Memory Access b) Direct Module Access c) Direct Memory Access d) None of The Above

Last Answer : a) Direct Memory Access

Description : What should be minimum requirement of random access memory (RAM) for internet access: a) 8 MB b) 16 MB c) 32 MB d) 64 MB

Last Answer : c) 32 MB