1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
7

DMA controllers ____.A) do not utilize an additional, special purpose, processorB) are a nonstandard component in PCs of todayC)

can steal memory access cycles from the main CPUD) can access main memory at the same time as the main CPU
Computers and Technology
1 answer:
otez555 [7]3 years ago
8 0

Answer:

D) can access main memory at the same time as the main CPU

Explanation:

DMA is short for Direct Memory Access, these controllers allow the device to transfer data directly to and from the memory modules without interfering with CPU processes. Therefore it can access main memory at the same time as the main CPU. Thus freeing up CPU processing power for other tasks while also retrieving the data necessary.

You might be interested in
This type of technology typically does NOT come with a keyboard or mouse for input.
anyanavicka [17]
The answer is C) tablet. You use the touch screen keyboard for that.
4 0
3 years ago
Read 2 more answers
Create a bulleted list of four descriptive terms describing possible values a person may have. These may be your own values, or
Minchanka [31]
Create a bulleted list of four descriptive terms describing possible values a person may have.

* always be true to yourself
* honesty is the best policy
* making mistakes leads you to solutions
* it's ok to be wrong
7 0
3 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
4 years ago
What is software?
bogdanovich [222]

Answer:

B

Explanation:

3 0
3 years ago
Read 2 more answers
How do you clear space in your iCloud?
Oxana [17]
Reset your settings and all storage by using your computer or device filter
6 0
3 years ago
Other questions:
  • Hi Im really a girl and i want to know how to change my username without having to make a new account?
    9·2 answers
  • The part of the computer that provides access to the internet is the-?
    15·2 answers
  • During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
    9·1 answer
  • A(n) _____ is a request for the database management software to search the database for data that match criteria specified by th
    15·2 answers
  • If you're unsure of what chart to use for a set of data, what feature does Excel include that will help you to decide?
    7·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    12·2 answers
  • What do you hope that people see in your digital footprint 5 years from now? ​
    5·1 answer
  • Sharing resources.
    14·1 answer
  • Yeoo check dis out!!!!!! wait my full vid dont show hol on
    7·2 answers
  • How do u type please help
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!