When a virtual address points to a page that is not in real memory, a(n) __________ is recognized and a page-in (or swap-in) operation begins.

a. interrupt
b. page fault
c. polling signal
d. page interrupt


b. page fault

Computer Science & Information Technology

You might also like to view...

How must the recipient of a notification be configured in SQL Server Agent?

A. as a mail recipient B. as an alert administrator C. as an operator D. as an Agent manager

Computer Science & Information Technology

To preview a template, click the File tab to access the ________ view of Word

Fill in the blank(s) with correct word

Computer Science & Information Technology

WSDL is in a(n) ____ format.

A. SOAP B. DHTML C. XML D. HTML

Computer Science & Information Technology

Which of the following is not true about the message to enable editing or enable content?

a. You might encounter these security features if you open a file from an e-mail or download files from the Internet. b. In Office 2010, some files open in Private View if the file appears to be from a potentially risky location, such as the Internet. c. These options are new security features in Office 2010 that protect your computer from malicious files by opening them in a restricted environment until you enable them. d. Trusted Documents is another security feature that remembers which files you have already enabled.

Computer Science & Information Technology