1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
10

The method for updating the main memory as soon as a word is removed from the cache is called

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
7 0
The method for updating the main memory as soon as word is removed from the cache is called write-back.
You might be interested in
Why should you use a named constant for the size of an array?
Brut [27]
I can think of the following reasons:

- Avoid magic numbers. The constant will have a descriptive name like "MAX_MEASUREMENTS" so it can be inferred what the array size really means.

- Avoid duplication. There could be some related code (e.g., code that checks if an index is within the array bounds) that can benefit from using the same constant. Then it makes sense to tie them together such that if you change the constant, you're actually changing all its occurrances.

- Central configuration. By placing all your constants in a centralized place in the code, it is clear to see where your configuration resides. This is easier than having magic numbers scattered throughout the code.
3 0
4 years ago
What steps will change an existing macro? Use the drop-down menu to complete the steps.
Aneli [31]

Answer:

1. View

2. View macros

3. Edit

Explanation: completed on edge

6 0
3 years ago
Read 2 more answers
What was the computer works in binary functions
Mariulka [41]
Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.
7 0
3 years ago
If you want to design computing components for cars and medical
Marysya12 [62]

Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

<h3>What Is Computer Engineering?</h3>

Computer Engineering is known to be one filed that is made up of the fields of electrical engineering and also that of computer science to form new kind of system hardware or software.

Based on the above, Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

Learn more about Computer engineering from

brainly.com/question/24181398

#SPJ1

4 0
3 years ago
What problems can arise if the client, developer, and user are the same person? How can these problems be solved?
Aloiza [94]

Answer:

1 - if all three are the same person then possibility of verifying the software or its scope for the general public will remain unknown

2 - it will not return any profit when all are the same person thus it will remain in one isolated environment

3 - it cannot be used by the masses if all three people are the same person

Explanation:

while building any software system it needs three sets of people who are an important part of this development chain. They are the client, developer, and user. if suppose all three are the same person while developing any software then some problems are occurring and that are mentioned below

1 - if all three are the same person then possibility of verifying the software or its scope for the general public will remain unknown

2 - it will not return any profit when all are the same person thus it will remain in one isolated environment

3 - it cannot be used by the masses if all three people are the same person

the one thing that needs to be done for removing all these problems is to assigned different people for different phases. so that the developer can validate the scope of software in the market.

5 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • What is the name of the feature that can be enabled on slower-speed WAN links to prevent a large data transfer from affecting th
    10·1 answer
  • The Internet of Things (IoT) is a global information architecture that could contain
    12·1 answer
  • Computer programs and games are called what?
    13·1 answer
  • Strobe lights can become more yellow as they age true or false
    8·1 answer
  • What is the range for copper tape
    15·1 answer
  • USE THIS CODE ON FETCH REWARDS FOR BRAINLIEST​
    10·1 answer
  • A director was fined heavily for shooting in his own house in New York. What do you think was his mistake?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!