_________ locality is generally exploited by using larger cache blocks and by fetching items of anticipated use into the cache control logic.
A. Associative
B. Physical
C. Spatial
D. Prefetching
C. Spatial
Computer Science & Information Technology
You might also like to view...
The smallest type of notebook computer is a ________, which is designed primarily for accessing the Internet
A) netbook B) client C) laptop D) workstation
Computer Science & Information Technology
What Dynamic Volume Type has one disk stores a copy of the other disk?
A. Simple B. Spanned C. RAID 5 D. Mirrored
Computer Science & Information Technology