Processor affinity is the __________.

a) relationship among processes that execute on the same processor
b) relationship of a process to a particular processor and its local memory and cache
c) likelihood that a process will execute on a particular processor
d) likelihood that a memory page will reside in the local memory of a particular processor

b) relationship of a process to a particular processor and its local memory and cache

Computer Science & Information Technology

You might also like to view...

Device drivers are written for a specific combination of ________ and devices

A) computers B) peripherals C) ports D) operating systems

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised. 2. A SIP flood attack exploits the fact that a single INVITE request triggers considerable resource consumption. 3. Slowloris is a form of ICMP flooding. 4. Reflector and amplifier attacks use compromised systems running the attacker’s programs. 5. There is very little that can be done to prevent a flash crowd.

Computer Science & Information Technology