Match each item with a statement below.
A. an internal communications pathway inside a computer that specifies the source and target address for memory reads and writes
B. the speed at which the processor communicates with the memory and other devices in the computer
C. an internal communications pathway that carries data between the CPU and memory locations
D. computer architecture in which processor components are reconfigured to conduct different operations as required
E. the part of a processor used to read and execute instructions
F. the speed at which the CPU executes internal commands
G. internal communications pathway that keeps the CPU informed of the status of particular computer resources and devices
H. the group of commands the processor recognizes
I. computer architecture that dedicates processor hardware components to certain functions
J. a CPU design that permits the processor to operate on one instruction at the same time it is fetching one or more subsequent instructions
A. address bus
B. external clock speed
C. data bus
D. CISC
E. core
F. internal clock speed
G. control bus
H. instruction set
I. RISC
J. pipelining
You might also like to view...
What is the value of the following expression?
char (int (‘z’) – int (‘w’) + int (‘A’)) a) 3 b) 67 c) E d) D
Answer the following statements true (T) or false (F)
1. Because the subclass is more specialized than the superclass, it is sometimes necessary for the subclass to replace inadequate superclass methods with more suitable ones. 2. When a subclass overrides a superclass method, only the subclass's version of the method can be called with a subclass object. 3. Inheritance involves a subclass, which is the general class, and a superclass, which is the specialized class. 4. It is not possible for a superclass to call a subclass's method. 5. When a subclass extends a superclass, the public members of the superclass become public members of the subclass.
The IEEE organization has made first-generation Bluetooth the basis for its 802.15 standard for wireless ______________.
Fill in the blank(s) with the appropriate word(s).
The Layer Two Tunneling Protocol uses what set of standards to provide encryption and security for a tunnel?
A. Point-to-Point Protocol (PPP) B. Microsoft Point-to-Point Encryption (MPPE) C. IP Security (IPSec) D. Advanced Encryption Standard (AES)