Home

What is the correct answer?

4

The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________

A. interrupting

B. cycle stealing

C. swapping

D. paging

Correct Answer :

B. cycle stealing


Related Questions

Once text has been cut to the clipboard, you can____hat text into another… The maximum size of a write file is limited to only In the case of____________ , changes to an open file are only locally… What is Dr. Watson? An unauthorized party inserts counterfeit objects into the system is called_________________ The name services of DCE include ________ When copying more than one file at a time, you must specify an existing… Which components appear in the initial Windows start up display? Most accurate global time is based on oscillations of the ______________ Initialization of I/O devices is part of the_________. _______________occurs when two or more execution flows are able to run… A process is _________________ Recently deleted files are stored in _________, as a feature of good distributed file system, clients should… Which of the following is/are external commands? Which components appear in the initial windows start up display? In ____________ location policies a random node is polled to check its… A shared memory segment first needs to be allocated (create, using the__________… A small part of taskbar that has icons of background running applications… ____________approach can place the data directly into the memory or take… Bootstrapping is also known as ______ When resources have multiple instances ________ is used for deadlock Avoidance. ______________ refers to the technology in which some space in hard disk… Two clocks are said to be synchronized at a particular instance of time… When a peripheral device needs immediate attention from the operating… Pick the wrong statement from the following. Which is the layer of a computer system between the hardware and the user… Load balancing algorithms in ______________ class use the processor and… Wiretapping to capture data in a network is an example of ________________ DSM stands for______________