________ strategies attempt to load a piece of program or data into memory before it is referenced.

a) Demand fetch
b) Anticipatory fetch
c) First-fit placement
d) Next-fit placement


b) Anticipatory fetch

Computer Science & Information Technology

You might also like to view...

A ________ provides a means for describing a class in a type-independent manner.

a. subclass b. generic class c. concrete class d. parameterized class

Computer Science & Information Technology

What is the value of j after the end of the following code segment?

For j As Integer = 1 to 23 lstBox.Items.Add("The counter value is " & j) Next (A) 22 (B) 23 (C) 24 (D) j no longer exists

Computer Science & Information Technology

_______ is the time to plan how the program will accomplish the determined task.

A. Program design B. Assembly design C. Processing design D. Program statement document

Computer Science & Information Technology

All operating systems and many switches and routers come with some form of ____________________ that defines what users can do with a device's shared resources.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology