________ enables devices and controllers to transfer blocks of data to and from main memory directly.
a) Programmed I/O
b) Direct memory access (DMA)
c) Interrupt-driven I/O
d) Pipelining
b) Direct memory access (DMA)
You might also like to view...
Files stored on your computer when you browse the Internet with Internet Explorer are called:
A) cookies B) Setup Log Files C) Downloaded Program Files D) Temporary Internet Files
When cabling a rack, which of the following is BEST practice?
A. Use rack specific cabling hardware B. Let cables hang loosely behind the servers C. Channel all power cables down the sides, and all network cables down the center D. Keep cables close to the front of the rack for better access
The presence of an active task in an MVS partition or region is indicated by a(n) __________.
a. TCB b. SVRB c. PRB d. interrupt
How can confidentiality and authentication be achieved using public key cryptography?
What will be an ideal response?