What type of memory has extra chips at the bottom to delay data transfers to ensure accuracy?

A) ECC
B) VCM
C) Parity
D) Registered


D

Computer Science & Information Technology

You might also like to view...

Which of the following are steps to keep in mind when hardening a system?  (Choose all that apply.)

A. learn about new threats and how to handle them B. regularly audit security configuration C. focus your attention on PC operating systems since mobile operating systems are not vulnerable to attack D. monitor for evidence of attacker

Computer Science & Information Technology

Some programmers prefer not to use protected access because they believe it breaks the encapsulation of the base class. Discuss the relative merits of using protected access vs. using private access in base classes.

What will be an ideal response?

Computer Science & Information Technology

An expression containing integer and floating-point values is called a ____ expression.

A. whole B. standard C. mixed-mode D. real

Computer Science & Information Technology

The ____ tier is a tier within the three-tier structure into which programs are divided.

A. Presentation B. Records C. Business D. Persistence

Computer Science & Information Technology