With __________ additional hardware is used to ensure that all updates to main memory via cache are reflected in all caches.

A. noncacheable memory
B. hardware transparency
C. bus watching
D. write through

B. hardware transparency

Computer Science & Information Technology

You might also like to view...

The outline of a shape can be completely removed

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following best describes the purpose of security training?

A. To teach skills that would allow a person to perform a certain function B. To focus attention on security C. To integrate all the security skills and competencies into a common body of knowledge D. To involve management in the process

Computer Science & Information Technology