____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.
A. Memory-mapped
B. Virtual memory
C. Virtual system
D. Cached
Answer: A
Computer Science & Information Technology
You might also like to view...
The term ____ refers to packaging a number of items into a single unit.
a. modular b. encapsulation c. interface d. compression
Computer Science & Information Technology
If there is a close relationship between the recipient and the sender of the letter, the appropriate salutation is Dear plus the first name of the recipient, e.g., Dear Connie.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A file system is similar to a binary search tree.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The term usability refers to how easy it is to modify and maintain a program.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology