1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
3 years ago
9

Which of the following statements is true for DMA: (only one correct answer) A. In DMA, Processor checks status until the operat

ion is complete B. In DMA, Processor is interrupted when I/O module ready to execute data C. In DMA, no interrupt is produced D. In DMA, interrupt is sent when the task is completed E. None of the above
Computers and Technology
1 answer:
Ronch [10]3 years ago
6 0

Answer:

<u>D. In DMA, interrupt is sent when the task is completed</u>

Explanation:

Note, the term Direct Memory Access simply refers to a computer feature that allows hardware subsystems to directly access the main system memory of a computer, without any the aid of the central processing unit (CPU).

It is a fact that while the transfer process is ongoing, an interrupt (interrupt signal) is not sent until when the task is completed.

You might be interested in
____ is a style of programming that focuses on the step-by-step sequence of instructions and operations.
mario62 [17]

Answer: Algorithm

Explanation: An algorithm is a plan, a set of step-by-step instructions to solve a problem. it involves three basic building blocks to use when designing algorithms. these are.,

1. Sequencing

2. Selection

3. Iteration

7 0
3 years ago
Read 2 more answers
What does the domain in an email message mean?
Zina [86]
The correct answer to this question is letter "C. type of service provider."

Here are the following choices:
<span>A. subject matter of the message.
B. type of software being used.
C. type of service provider.
D. location of the destination</span>
8 0
3 years ago
Traffic flow analysis is classified as which?
Anna35 [415]

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

8 0
3 years ago
You have just started a new job as the administrator of the eastsim domain. The manager of the accounting department has overhea
Luda [366]

Explanation:

To implement the desired password policy, you have to carry out these steps

1. An organizational unit, OU has to be created for these employees in east-sim.com

2. Since there is an organizational unit created for the accounting employees, you have to put the employees user objects in this Organizational unit.

3. Then as the administrator the next step that i would take is the configuration of the password policy, then i would link this to the already created organizational unit for these employees

3 0
2 years ago
A camera scan of grieving Columbine family members and friends_
Reika [66]

Answer:

is an invasion of privacy and therefore not newsworthy

Explanation:

8 0
3 years ago
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • true or false manual handling of materials accounts for the primary source of energy in the workplace
    13·2 answers
  • The Quick Access Toolbar cannot be customized and have extra commands added to it
    5·1 answer
  • Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
    10·1 answer
  • Which one of the following characteristics or skills of a ScrumMaster are closelyaligned with coaching?Select one:
    5·1 answer
  • How do you close a file?
    12·2 answers
  • Which of these might be an example of an advertiser's target group?
    12·2 answers
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • Similarities between master file and reference file
    12·1 answer
  • Which code snippet is the correct way to rewrite this in Semantic HTML?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!