A number assigned to expansion adapters or ports so that the CPU can prioritize between two (or more) devices that need attention is a(n)

A) IRQ
B) I/O address
C) DMA channel
D) USB enabler


A

Computer Science & Information Technology

You might also like to view...

Given that you have two versions of a function that are the same except that one expects some integer parameters, and the other expects a float and an integer parameter, which parameters would you change to a T in order to make this a template function?

a. The parameter that always stays an integer b. The parameter that is an integer in one function and a float in the other function. c. Both parameters change d. neither parameter changes

Computer Science & Information Technology

A secret key for symmetric encryption that is generated for use for a short period of time is called a _________ .

A. strategic key B. sequence key C. session key D. stream key

Computer Science & Information Technology

Give examples in which process migration is used to exploit resource locality and to balance work load

What will be an ideal response?

Computer Science & Information Technology

Which of the following is an example of a browser-based data?

A. Cookies B. Form history C. Search bar history D. All the above

Computer Science & Information Technology