The technique where the processor is equipped with hardware that allows it to interrogate simultaneously a number of TLB entries to determine if there is a match on page number is referred to as __________
Fill in the blank(s) with the appropriate word(s).
associative mapping
You might also like to view...
Show an alternative diagrm for the hierarchy in exercise 8.1. Explain why it may be a better or worse approach than the original.
What will be an ideal response
All of the following are methods to protect a computer from theft EXCEPT ________
A) carefully safeguarding a portable computer when traveling B) placing identification tags on the system unit and monitor C) securing the computer to the desk or table with cables and locks D) controlling access to computer labs
R.O.I stands for?
What will be an ideal response?
Which antivirus technique intercepts a virus when it starts and stops it from infecting other files?
a. Signature scanning b. Heuristic scanning c. Integrity checking d. Activity blocking