A 16-bit machine can access more than 64 KB if addresses are broken into two or more parts and transmitted during successive __________.

a. instructions
b. physical I/O operations
c. logical I/O operations
d. machine cycles


d. machine cycles

Computer Science & Information Technology

You might also like to view...

Decorative formats such as outlines, shadows, text glow and colors are called ________ ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The _______________ CODEC is used for Skype video conferencing.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Case PPT 4-1Ashley works in the Human Resources department of a large company. She is creating a slide show to inform employees about the company's new "green" policies. Ashley wants to insert a picture in a table. Which button should she use?

A. Effects B. Quick Styles C. Borders D. Shading

Computer Science & Information Technology