Under the SEQ global replacement strategy, when looping behavior is detected, the _________ strategy is employed.

a) least-recently-used (LRU)
b) most-recently-used (MRU)
c) not-used-recently (NUR)
d) first-in-first-out (FIFO)


b) most-recently-used (MRU)

Computer Science & Information Technology

You might also like to view...

Which federal regulation requires financial institutions to protect their customers’ information against security threats?

A) HIPAA B) GLBA C) PCI DSS D) FISMA

Computer Science & Information Technology

The ________ function is used to find the median of values in a range

A) SUM B) AVERAGE C) COUNT D) COUNTA

Computer Science & Information Technology

The Accounting number format assigns a(n) floating dollar sign.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A workbook is defined as

A) similar to a spreadsheet but bound rather than electronic. B) a file containing related worksheets. C) an un-editable "picture" of data. D) the address of the current cell.

Computer Science & Information Technology