__________ technology is a set of extensions built on top of the Intel architecture that enhance the performance of multimedia applications such as video, audio, and 3D graphics.

a. Pentium
b. MMX
c. Celeron
d. AGV


b. MMX

Computer Science & Information Technology

You might also like to view...

A ________ is used to protect logos or symbols that represent a brand

A) trademark B) copyright C) public domain D) patent

Computer Science & Information Technology

You turn your computer on and nothing happens. The computer light is off. You check the fan and it is running. Which of the following can you assume?

A) The on/off button is malfunctioning. B) The outlet is supplying power. C) The motherboard is bad. D) There is no operating system installed.

Computer Science & Information Technology

Which vulnerability follows the application in the vulnerability cycle?

A. service/server B. client C. human/organization D. network

Computer Science & Information Technology

What should you do if you see pound signs (###) instead of values or results of formulas?

What will be an ideal response?

Computer Science & Information Technology