Home
PDF Download
Exams
G.K.
Aptitude
Reasoning
English
Computer
Biology
Privacy
About
Contact
Home
All MCQ
Exams
PDF Download
G.K.
Aptitude
Reasoning
English
Computer
Biology
Privacy
About
Contact
What is the correct answer?
4
The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
A.
interrupting
B.
cycle stealing
C.
swapping
D.
paging
Correct Answer :
B. cycle stealing
Related Questions
Once text has been cut to the clipboard, you can____hat text into another…
The maximum size of a write file is limited to only
In the case of____________ , changes to an open file are only locally…
What is Dr. Watson?
An unauthorized party inserts counterfeit objects into the system is called_________________
The name services of DCE include ________
When copying more than one file at a time, you must specify an existing…
Which components appear in the initial Windows start up display?
Most accurate global time is based on oscillations of the ______________
Initialization of I/O devices is part of the_________.
_______________occurs when two or more execution flows are able to run…
A process is _________________
Recently deleted files are stored in
_________, as a feature of good distributed file system, clients should…
Which of the following is/are external commands?
Which components appear in the initial windows start up display?
In ____________ location policies a random node is polled to check its…
A shared memory segment first needs to be allocated (create, using the__________…
A small part of taskbar that has icons of background running applications…
____________approach can place the data directly into the memory or take…
Bootstrapping is also known as ______
When resources have multiple instances ________ is used for deadlock Avoidance.
______________ refers to the technology in which some space in hard disk…
Two clocks are said to be synchronized at a particular instance of time…
When a peripheral device needs immediate attention from the operating…
Pick the wrong statement from the following.
Which is the layer of a computer system between the hardware and the user…
Load balancing algorithms in ______________ class use the processor and…
Wiretapping to capture data in a network is an example of ________________
DSM stands for______________
Also checkout
Social Media Optimization (SMO) MCQ
Structural Organization In Animals MCQ
Kidney cysts and tumors MCQ
Zoology MCQ
Chemical Bonding and Molecular Structure MCQ
Rearrangement Set 13 MCQ
Races and Games MCQ
Entrepreneurship MCQ
Articles MCQ
Problems on Trains MCQ
Open Source Software MCQ
Endocrine System MCQ