____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.


B. Daisy chain arbitration

C. polling

D. none of these

Related Questions

  1. ____________approach can place the data directly into the memory or take the data directly from the…
  2. In___________, the requesting device or devices assert the signal bus_request.
  3. Once text has been cut to the clipboard, you can____hat text into another document
  4. The Basic Input Output System (BIOS) resides in
  5. Pick the wrong statement from the following.
  6. In case of modification an unauthorized party not only gains access to but tampers with an asset. This…
  7. Which components appear in the initial windows start up display?
  8. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local…
  9. The primary purpose of an operating system is:
  10. One of the wonderful things about UNIX is its ___________names.
  11. Process migration involves__________________
  12. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
  13. A page fault occurs when
  14. Fsck conducts a check in _____ phases
  15. In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K…
  16. A process is _________________
  17. In the case of____________ , changes to an open file are only locally visible.
  18. Choose the correct statement from the following.
  19. In case of good process migration mechanism, _____________ means failure of any node other than the…
  20. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed,…
  21. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between…
  22. Which of the following is suitable after you install new drivers?
  23. In ________________________ each node periodically sends a message to the time server.
  24. Identify the distributed computing model from the following statement. In this model, the user's processes…
  25. _______________occurs when two or more execution flows are able to run simultaneously.
  26. The algorithm should be scalable i.e. _____________.
  27. Windows 2000 supports -------------- type of file system
  28. Which of the following does not occur during the power-on-self-test (POST)?
  29. PVM stands for
  30. What is dispatch latency?

Please do not use chat terms. Example: avoid using "grt" instead of "great".