Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


DMA - abbrevation (Direct Memory Access,Discrete memory
Access,Disk memoryaccess)

Answers were Sorted based on User's Feedback



DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess) ..

Answer / auradi

DMA--> Direct Memory Access is the Right answer
which is given in gelvin Operating System 6Th edition...

Is This Answer Correct ?    8 Yes 0 No

DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess) ..

Answer / swetcha

Direct memory access

Is This Answer Correct ?    6 Yes 0 No

DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess) ..

Answer / ravi kumar cv

Direct Memory Access

Is This Answer Correct ?    5 Yes 0 No

DMA - abbrevation (Direct Memory Access,Discrete memory Access,Disk memoryaccess) ..

Answer / hemant chand dungriyal

Direct memory access (DMA)

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More Operating Systems AllOther Interview Questions

Is the g in gnu silent?

0 Answers  


what is gr-edge edit?

0 Answers  


What is the difference between concurrency and parallelism?

0 Answers  


Is the higher the ghz the better?

0 Answers  


How do I clean up and speed up my laptop?

0 Answers  


What Command To Restore Backup Of Non - Rootvg?

0 Answers   IBM,


what kind of operating(s)systems would be needed (and explain why) in an environment where there exist various cluster of networks which are all interconnected in different geographical areas with strong emphasis on online applicating process.

0 Answers  


Does a disk cleanup delete everything?

0 Answers  


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


How do I boot up my computer?

0 Answers  


How do I compare files in notepad ++?

0 Answers  


How do I compare plugins in notepad ++?

0 Answers  


Categories