With __________ additional hardware is used to ensure that all updates to main memory via cache are reflected in all caches.
A. noncacheable memory
B. hardware transparency
C. bus watching
D. write through
B. hardware transparency
Computer Science & Information Technology
You might also like to view...
The outline of a shape can be completely removed
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following best describes the purpose of security training?
A. To teach skills that would allow a person to perform a certain function B. To focus attention on security C. To integrate all the security skills and competencies into a common body of knowledge D. To involve management in the process
Computer Science & Information Technology