Under the SEQ global replacement strategy, when looping behavior is detected, the _________ strategy is employed.
a) least-recently-used (LRU)
b) most-recently-used (MRU)
c) not-used-recently (NUR)
d) first-in-first-out (FIFO)
b) most-recently-used (MRU)
Computer Science & Information Technology
You might also like to view...
Which federal regulation requires financial institutions to protect their customers’ information against security threats?
A) HIPAA B) GLBA C) PCI DSS D) FISMA
Computer Science & Information Technology
The ________ function is used to find the median of values in a range
A) SUM B) AVERAGE C) COUNT D) COUNTA
Computer Science & Information Technology
The Accounting number format assigns a(n) floating dollar sign.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A workbook is defined as
A) similar to a spreadsheet but bound rather than electronic. B) a file containing related worksheets. C) an un-editable "picture" of data. D) the address of the current cell.
Computer Science & Information Technology