The technique where the processor is equipped with hardware that allows it to interrogate simultaneously a number of TLB entries to determine if there is a match on page number is referred to as __________

Fill in the blank(s) with the appropriate word(s).


associative mapping

Computer Science & Information Technology

You might also like to view...

Show an alternative diagrm for the hierarchy in exercise 8.1. Explain why it may be a better or worse approach than the original.

What will be an ideal response

Computer Science & Information Technology

All of the following are methods to protect a computer from theft EXCEPT ________

A) carefully safeguarding a portable computer when traveling B) placing identification tags on the system unit and monitor C) securing the computer to the desk or table with cables and locks D) controlling access to computer labs

Computer Science & Information Technology

R.O.I stands for?

What will be an ideal response?

Computer Science & Information Technology

Which antivirus technique intercepts a virus when it starts and stops it from infecting other files?

a. Signature scanning b. Heuristic scanning c. Integrity checking d. Activity blocking

Computer Science & Information Technology