________ is a technique that can improve working set page replacement by removing pages from memory a process is no longer using.

a) Anticipatory page replacement
b) Voluntary page release
c) Asynchronous page flushing
d) none of the above


b) Voluntary page release

Computer Science & Information Technology

You might also like to view...

To test whether a character is a numeric digit character, use the __________ function.

a. isnumber b. notAlpha c. isnumeric d. isdigit e. None of these

Computer Science & Information Technology

Add a constraint to the schema that enforces the restriction that the number of books assigned to a shelf cannot exceed the shelf capacity.

What will be an ideal response?

Computer Science & Information Technology

You have recently been hired to manage your company's security team. You must ensure that an effective security team is built. Which policies should you keep in mind for this? (Choose all that apply.)

A. Team leadership must be obtained from within the security industry. B. Team members must include individuals from across the entire spectrum of security. C. Team goals must be clearly defined and understood. D. Team actions must have clearly defined rules.

Computer Science & Information Technology

To include calculated fields in queries, enter a name for the calculated field, a(n) _____, and then the expression in one of the columns in the Field row.

A. colon (:) B. semi-colon (:) C. equal sign (=) D. exclamation point (!)

Computer Science & Information Technology