____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.

A. Memory-mapped
B. Virtual memory
C. Virtual system
D. Cached


Answer: A

Computer Science & Information Technology

You might also like to view...

The term ____ refers to packaging a number of items into a single unit.

a. modular b. encapsulation c. interface d. compression

Computer Science & Information Technology

If there is a close relationship between the recipient and the sender of the letter, the appropriate salutation is Dear plus the first name of the recipient, e.g., Dear Connie.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A file system is similar to a binary search tree.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The term usability refers to how easy it is to modify and maintain a program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology