Fulfilling an I/O request without generating an IRP or accessing a device is referred to as ________.
a) fast I/O
b) direct I/O
c) buffered I/O
d) neither I/O
a) fast I/O
Computer Science & Information Technology
You might also like to view...
When using a private computer to access your e-mail account, it is important to log off when you are done to make sure that unauthorized persons do not use your account.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is the definition of phishing?
What will be an ideal response?
Computer Science & Information Technology