_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

A. Main memory
B. A register
C. The control unit
D. The motherboard


Answer: B

Computer Science & Information Technology

You might also like to view...

Two networks can interconnect using a device called a(n) router.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What protocol does VMM use to communicate with VMM agents?

A. BITS B. WinRM C. WCF D. RDP

Computer Science & Information Technology

CD is the command used to change directories

Indicate whether the statement is true or false

Computer Science & Information Technology

The term _____ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.

a. data loss prevention b. trade secret c. counterintelligence d. competitive intelligence

Computer Science & Information Technology