Several ________ serve as traffic directors for all data flowing through a motherboard.

A. GPUs
B. haptics
C. chipsets
D. cores


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The cryptographic hash function is not a versatile cryptographic algorithm. 2. It is possible to use a hash function but no encryption for message authentication. 3. Encryption hardware is optimized toward smaller data sizes. 4. Hash functions are commonly used to create a one-way password file. 5. A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

Computer Science & Information Technology

Consider the relation schema corresponding to the IsA hierarchy in Figure 4.6. Assume that this schema has one relation per entity. (Consult Section 4.4 to refresh your memory about translation of IsA hierarchies into the relational model.) Write the following queries both in tuple and domain relational calculus:

a. Find the names of all sophomores in the computer science major. b. Find the names of all students in the computer science major. c. Find all departments where some technician has every specialization that any other technician (in the same or another department) has.

Computer Science & Information Technology

Web page ____ generally feature text-only navigation, a copyright notice, and perhaps links to reference areas such as a privacy policy or contact information.

A. footers B. headers C. borders D. images

Computer Science & Information Technology

Which example shows the proper syntax of the close function?

A. close.fileObject(); B. fileObject.close(); C. fileType.close(); D. close.file();

Computer Science & Information Technology