1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
3 years ago
9

Which of the following statements is true for DMA: (only one correct answer) A. In DMA, Processor checks status until the operat

ion is complete B. In DMA, Processor is interrupted when I/O module ready to execute data C. In DMA, no interrupt is produced D. In DMA, interrupt is sent when the task is completed E. None of the above
Computers and Technology
1 answer:
Ronch [10]3 years ago
6 0

Answer:

<u>D. In DMA, interrupt is sent when the task is completed</u>

Explanation:

Note, the term Direct Memory Access simply refers to a computer feature that allows hardware subsystems to directly access the main system memory of a computer, without any the aid of the central processing unit (CPU).

It is a fact that while the transfer process is ongoing, an interrupt (interrupt signal) is not sent until when the task is completed.

You might be interested in
You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation
kompoz [17]

Answer:

a. This is an instance of overfitting.

Explanation:

In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.

4 0
3 years ago
To what health hazard are people working in offices most likely to be exposed.
Andrei [34K]

Answer:

Sickness

Explanation:

6 0
3 years ago
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying soc
katrin2010 [14]

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

7 0
3 years ago
A programmer writing code in class Point attempts to override the following inherited method:public boolean equals( Object o ) {
Mrrafil [7]

Answer:

a. A syntax error occurs because the method signatures do not match.

Explanation:

The method signature does not match as the method argument is wrong and so the compiler would issue a syntax error. Trying to override an inherited method from a class and not getting the method syntax correct would mean that the overide operation would not be successful as there would be a syntax error therefore it is paramount that the method argument is properly inputted in the above statement in order to successfully overide the inherited class method.

3 0
3 years ago
Select the correct answer. Which of these statements is an explorer most likely to make?​
Varvara68 [4.7K]

Answer:

Then it would be D for your answer. :)

Explanation:

please mark brainliest! :)

and have a great day!

3 0
3 years ago
Other questions:
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _____.
    10·1 answer
  • In ________ for final fields and methods the value is assignedlater but in ______ you assign the value during declaration.
    15·1 answer
  • How to make a water bottle rocket??
    6·1 answer
  • A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.
    8·1 answer
  • Create a flowchart that assigns a counselor to a student.
    9·2 answers
  • Write the function evens which takes in a queue by reference and changes it to only contain the even elements. That is, if the q
    6·1 answer
  • Which of the following can technology NOT do?
    12·1 answer
  • How many days till earth ends
    12·1 answer
  • C program how to input this? ​
    11·1 answer
  • What is sexual intercourse <br><br>​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!