What is the correct answer?


The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________

A. interrupting

B. cycle stealing

C. swapping

D. paging

Correct Answer :

B. cycle stealing

Related Questions

Once text has been cut to the clipboard, you can____hat text into another… The maximum size of a write file is limited to only In the case of____________ , changes to an open file are only locally… What is Dr. Watson? An unauthorized party inserts counterfeit objects into the system is called_________________ The name services of DCE include ________ When copying more than one file at a time, you must specify an existing… Which components appear in the initial Windows start up display? Most accurate global time is based on oscillations of the ______________ Initialization of I/O devices is part of the_________. _______________occurs when two or more execution flows are able to run… A process is _________________ Recently deleted files are stored in _________, as a feature of good distributed file system, clients should… Which of the following is/are external commands? Which components appear in the initial windows start up display? In ____________ location policies a random node is polled to check its… A shared memory segment first needs to be allocated (create, using the__________… A small part of taskbar that has icons of background running applications… ____________approach can place the data directly into the memory or take… Bootstrapping is also known as ______ When resources have multiple instances ________ is used for deadlock Avoidance. ______________ refers to the technology in which some space in hard disk… Two clocks are said to be synchronized at a particular instance of time… When a peripheral device needs immediate attention from the operating… Pick the wrong statement from the following. Which is the layer of a computer system between the hardware and the user… Load balancing algorithms in ______________ class use the processor and… Wiretapping to capture data in a network is an example of ________________ DSM stands for______________