What is the correct answer?


____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.


B. Daisy chain arbitration

C. polling

D. none of these

Correct Answer :


Related Questions

SRM stands for Windows 2000 supports -------------- type of file system Identify the distributed computing model from the following statement.… _______________occurs when two or more execution flows are able to run… Which of the following is suitable after you install new drivers? Identify the server:This type of server generally remains in existence… The primary purpose of an operating system is a … The controller can access memory in memory cycles which are not used by… Load balancing algorithms in ______________ class use the processor and… ______________ refers to the technology in which some space in hard disk… IDL stands for_____________________ ______________is responsible for allocating primary memory to processes… Which one is true for unconditional disk formatting? Which of the following is an essential file of a MS-DOS boot disk? Wiretapping to capture data in a network is an example of ________________ What is Dr. Watson? The essential difference between an operating system like Linux and one… ______________ selects a process from among the ready processes to execute… The maximum size of a write file is limited to only A bar that inform you the available options in your computer, opened applications,… Two clocks are said to be synchronized at a particular instance of time… __ is the program run on a computer when the computer boots up The Bankers algorithm is used ___________variable is not automatically created on all UNIX systems but… Bootstrapping is also known as ______ Once text has been cut to the clipboard, you can____hat text into another… The problem with logical dumping is ________________ Objects location is found by _________________ A small part of taskbar that has icons of background running applications… Which of the following is/are external commands?