In IT the technique that is used to increase the bandwidth is (1) Memory Management (2) Memory Interleaving (3) Memory Intraleaving (4) Memory Leaving

1 Answer

Answer :

Memory Interleaving

Related questions

Description : Sector interleaving in disks is done by: a) the disk manufacturer b) the disk controller cord c) the operating system d) None of The Above

Last Answer : c) the operating system

Description : Which search agent operates by interleaving computation and action? a) Offline search b) Online search c) Breadth-first search d) Depth-first search

Last Answer : b) Online search

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : Technique of using disk space to make programs believe that the system contains more Random Access Memory(RAM) than is actually available is called ______ A. Random Access Memory B. Primary Memory C. Secondary Memory D. Virtual Memory

Last Answer : D. Virtual Memory

Description : Technique to implement virtual memory where memory is divided into units of fixed size memory is _________ A. Paging B. De-fragments C. Segmentation D. None of the above

Last Answer : A. Paging

Description : A technique used by codes to convert an analog signal into a digital bit stream is known as A) Pulse code modulation B) Pulse stretcher C) Query processing D) Queue management

Last Answer : Answer : A

Description : What are 2 advantages of cache memory: a. Reduction of average access time for CPU memory b. Reduction of bandwidth of available memory of CPU c. Botha&b d. None of these

Last Answer : c. Botha&b

Description : Which of the following is not a way of minimizing if not eliminating noise? A. Use redundancy B. Increase transmitted power C. Reduce signaling rate D. Increase channel bandwidth

Last Answer : D. Increase channel bandwidth

Description : How can receiver desensitizing be reduced? A. Increase the receiver bandwidth B. Ensure good RF shielding between the transmitter and receiver C. Increase the transmitter audio gain D. Decrease the receiver squelch, gain.

Last Answer : D. Decrease the receiver squelch, gain.

Description : Top loading is used in an antenna in order to increase its ___________. A. input capacitance B. beamwidth C. bandwidth D. effective height

Last Answer : D. effective height

Description : Which of the following methods cannot be used to increase the bandwidth for cascaded RF amplifier stages? A) Wave traps in each stage B) Stagger tuning C) A shunt damping resistor across each tuned circuit D) Doubled tuned transformers with tighter coupling

Last Answer : A) Wave traps in each stage

Description : Which preamplifier design (high-impedance or transimpedance) provides improvements in bandwidth and greater dynamic range with some degradation in sensitivity from an increase in noise?

Last Answer : Transimpedance.

Description : Zoningis usedwith adielectric antenna inorderto a. reduce the bulk of the lense b. increase the bandwidth of the lens c. increase pin-point focusing d. correct the curvature of the wavefront from a horn that is too short

Last Answer : a. reduce the bulk of the lense

Description : Which of the following compensator will increase the bandwidth of the system: (1) Phase lag (3) Lag-Iead (2) Phase lead (4) None of these

Last Answer : Which of the following compensator will increase the bandwidth of the system: (1) Phase lag (3) Lag-Iead (2) Phase lead (4) None of these

Description : In PCM system, if we increase the quantization levels from 2 to 8, the relative bandwidth requirements will:  (1) Be doubled (2) Remain same (3) Be tripled (4) Becomes eight times

Last Answer : In PCM system, if we increase the quantization levels from 2 to 8, the relative bandwidth requirements will: Be tripled.

Description : Which of the following does not affect the resolution of a video display image? A) Bandwidth B) Raster scan rage C) Vertical and horizontal lines of resolution D) Screen size

Last Answer : Answer : D

Description : The rate at which scanning is repeated in a CRT is called ________ A. Resolution B. Refresh rate C. Bandwidth D. None of the Above

Last Answer : B. Refresh rate

Description : What is the minimum bandwidth required for broadband connection: a) 128 kbps b) 256 kbps c) 512 kbps d) None of These

Last Answer : b) 256 kbps

Description : 3 The whole email server may be targeted for a complete interruption of services with these failure like A)Storage overload and bandwidth blocking

Last Answer : A)Storage overload and bandwidth blocking

Description : The whole email server may be targeted for a complete interruption of services with these failure like A)Storage overload and bandwidth blocking

Last Answer : A)Storage overload and bandwidth blocking

Description : The rate at which scanning is repeated in a CRT is called : (1) refresh rate (2) resolution (3) pitch (4) bandwidth

Last Answer : refresh rate

Description : Any method for controlling access to or use of memory is known A) Memory map B) Memory protection C) Memory management D) Memory instruction

Last Answer : Answer : B

Description : MMU stands for: a) Motherboard Memory Unit b) Memory Management Unit c) Main Memory Unit d) None of These

Last Answer : c) Main Memory Unit

Description : Which one among the following is not included in the basic functions of operating system? 1) Job Control 2) Job Scheduling 3) Memory Management 4) Data Management

Last Answer : 1) Job Control

Description : Rearranging and allocating space in memory to provide for multiple computing tasks is called (1) Networking (2) Multiprogramming (3) Multitasking (4) Memory Management

Last Answer : Memory Management

Description : Expansion of RDBMS is (1) Repairable Database Management System (2) Relational Database Management System (3) Relational Database Memory System (4) Recurring Database Memory System 

Last Answer : Relational Database Management System

Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These

Last Answer : b) Proxy Server

Description : Which among the following characteristics are correct about 'Cyberstalking': a) Cyberstalking is the use of the internet or electronics to stalk or harass an individual or any group. b) It includes making harassing phone ... ) It may be offline as well as online d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which technique is used for main memory array design: a. Linear decoding b. Fully decoding c. Both A and B d. None of these

Last Answer : c. Both A and B

Description : By using data compression technique, what can be done in the data storage place of memory and disk ? a) increment b) Reduction c) Transfer d) Repetition

Last Answer : b) Reduction

Last Answer : EPROM EEPROM Flash EPROM Normalize cell size is 1. Normalize cell size is about 1 ... and floating gate, which is insulated by a dielectric material. NAND flash memory and NOR flash memory are the two types of flash memory.

Description : Buffering is a ………….. management technique. -Technology

Last Answer : Buffering is a devicemanagement technique.

Description : Thrombolytic therapy has become a useful adjunct in the management of peripheral arterial occlusion. In this setting, direct intraarterial administration rather than intravenous has been advocated ... may be indicated for situations where complete clot evacuation cannot be accomplished surgically

Last Answer : Answer: a, b, e The most popular method for intraarterial thrombolytic therapy for arterial occlusion involves passing a guidewire through the thrombus with arteriographic guidance and ... acute arterial occlusion) or when distal vasculative is occluded and precludes appropriate inflow patency

Description : Which one of the following is the most appropriate management control technique for timely completion of a project ? (A) Organisation chart (B) Management by Objectives (C) PERT (D) Span of control

Last Answer : Answer: PERT

Description : The waste management technique that involves the use of microorganisms to remove or neutralize pollutants from contaminated site is called (1) Bio sensor (2) Bio magnification (3) Bio remecliation (4) Bio concentration

Last Answer : (3) Bio remecliation Explanation: Bioremediation is a waste management technique that involves the use of organisms to remove or neutralize pollutants from a contaminated site. It uses naturally occurring ... non-toxic substances. There are two classes of bioremediation used In situ and Ex situ.

Description : The advantage of following the IEEE Standard for drawing up a Project Management Plan (SPMP) - see IEEE Standard 1059.1 1987 - is a) It is drawn up by representatives from major  ... each organisation for a  particular applicationarea, development team or  technique. e) All of the above.

Last Answer : e) All of the above.

Description : . The PERT in project management means program evaluation and _____ technique. (A) resource (B) reconciliation (C) reconsideration (D) review

Last Answer : (D) review

Description : Identify which technique will not help a company to optimise its working capital cycle. A. Offering discounts for early payment by debtors B. Using cash management models to optimise the level of ... order quantity model to stock management E. Adopting the use of just-in-time stock management

Last Answer : B. Using cash management models to optimise the level of cash held

Description : _____ technique is related to Inventory management a. EOQ b. SQC c. CPM d. transportation

Last Answer : a. EOQ

Description : ______ are technique applied in project management a. CPM b. Assignment c. Transportation d. Decision theory

Last Answer : a. CPM

Description : 108.is primarily a management technique that uses energy information as a basis to eliminate waste, reduce and control current level of energy use and improve the existing operating procedures. a) Energy monitoring and targeting b) CUSUM c) Specific energy consumption d) Production

Last Answer : Energy monitoring and targeting

Description : Energy monitoring and targeting is primarily a management technique that use Energy system on basic to A) Eliminate waste C) Reduce pollution B) Both A & C are correct D) None of above

Last Answer : Eliminate waste

Description : Energy monitoring and targeting is primarily a____________ technique. A) management C) information B) installation D) none of above

Last Answer : management

Description : A technique used by codes to convert an analog signal into a digital bit stream is known as a. Pulse code modulation b. Pulse stretcher c. Query processing d. Queue management

Last Answer : a. Pulse code modulation

Description : A technique used by codes to convert an analog signal into a digital bit stream is known as a. Pulse code modulation b. Pulse stretcher c. Query processing d. Queue management

Last Answer : a. Pulse code modulation

Description : A technique used by codes to convert an analog signal into a digital bit stream is known as a. Pulse code modulation b. Pulse stretcher c. Query processing d. Queue management

Last Answer : a. Pulse code modulation

Description : A manufacturer has decided to improve its inventory management by maintaining low inventory levels and waiting to purchase materials until right before they are needed in production. This inventory ... time (JIT). B)inventory minimisation. C)economic order quantity.D)reorder point maximisation.

Last Answer : D)reorder point maximisation.

Description : How 5’s can be used as waste management technique 

Last Answer : 5's can be used as a waste management technique as it has the main objectives to eliminate the waste. [1] It keeps the inventory at needed level only. [2] It Keeps the workplace in ... with the help of such waste prevention approach in 5's it can be efficiently used as waste management technique