Processor affinity is the __________.
a) relationship among processes that execute on the same processor
b) relationship of a process to a particular processor and its local memory and cache
c) likelihood that a process will execute on a particular processor
d) likelihood that a memory page will reside in the local memory of a particular processor
b) relationship of a process to a particular processor and its local memory and cache
You might also like to view...
Device drivers are written for a specific combination of ________ and devices
A) computers B) peripherals C) ports D) operating systems
Answer the following statements true (T) or false (F)
1. The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised. 2. A SIP flood attack exploits the fact that a single INVITE request triggers considerable resource consumption. 3. Slowloris is a form of ICMP flooding. 4. Reflector and amplifier attacks use compromised systems running the attacker’s programs. 5. There is very little that can be done to prevent a flash crowd.