_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).
A. Main memory
B. A register
C. The control unit
D. The motherboard
Answer: B
Computer Science & Information Technology
You might also like to view...
Two networks can interconnect using a device called a(n) router.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What protocol does VMM use to communicate with VMM agents?
A. BITS B. WinRM C. WCF D. RDP
Computer Science & Information Technology
CD is the command used to change directories
Indicate whether the statement is true or false
Computer Science & Information Technology
The term _____ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.
a. data loss prevention b. trade secret c. counterintelligence d. competitive intelligence
Computer Science & Information Technology