__________ technology is a set of extensions built on top of the Intel architecture that enhance the performance of multimedia applications such as video, audio, and 3D graphics.
a. Pentium
b. MMX
c. Celeron
d. AGV
b. MMX
Computer Science & Information Technology
You might also like to view...
A ________ is used to protect logos or symbols that represent a brand
A) trademark B) copyright C) public domain D) patent
Computer Science & Information Technology
You turn your computer on and nothing happens. The computer light is off. You check the fan and it is running. Which of the following can you assume?
A) The on/off button is malfunctioning. B) The outlet is supplying power. C) The motherboard is bad. D) There is no operating system installed.
Computer Science & Information Technology
Which vulnerability follows the application in the vulnerability cycle?
A. service/server B. client C. human/organization D. network
Computer Science & Information Technology
What should you do if you see pound signs (###) instead of values or results of formulas?
What will be an ideal response?
Computer Science & Information Technology