Virtual memory/storage
This refers to the computer arrangement whereby the computer divides programs into fixed or
variable length portions, storing only a small portion of the program in primary memory (RAM)
at one time. Only a few statements of a program actually execute at any given moment.
Virtual storage thus permits a very large number of programs to reside in primary memory
because only a tiny portion of each program is actually located there thus resulting in efficient
RAM usage. All other program pages are stored on a peripheral disk unit until they are ready for
execution.
gregorymasila answered the question on November 18, 2017 at 08:25
- Discuss any four types of feasibility assessment that you need to perform to enable you
recommend the undertaking of-
a given project.(Solved)
Discuss any four types of feasibility assessment that you need to perform to enable you
recommend the undertaking of-
a given project.
Date posted: November 18, 2017. Answers (1)
- You have been appointed to be in charge of an information systems development
project. As a project leader, explain how you would ensure that the project...(Solved)
You have been appointed to be in charge of an information systems development
project. As a project leader, explain how you would ensure that the project succeeds.
Date posted: November 18, 2017. Answers (1)
- List five questions which need to be addressed when evaluating the strategic value of
Information Technology.(Solved)
List five questions which need to be addressed when evaluating the strategic value of
Information Technology.
Date posted: November 18, 2017. Answers (1)
- Why are tools such as data flow diagrams (DFD), entity relationship diagrams (ERD) and
flowcharts particularly suited for documenting design options of an information system
compared to...(Solved)
Why are tools such as data flow diagrams (DFD), entity relationship diagrams (ERD) and
flowcharts particularly suited for documenting design options of an information system
compared to narrative texts'?
Date posted: November 18, 2017. Answers (1)
- Outline the elements of decision support systems.(Solved)
Outline the elements of decision support systems.
Date posted: November 18, 2017. Answers (1)
- Outline the characteristics of decision support systems.(Solved)
Outline the characteristics of decision support systems.
Date posted: November 18, 2017. Answers (1)
- What are the characteristics of a good management information system?(Solved)
What are the characteristics of a good management information system?
Date posted: November 18, 2017. Answers (1)
- What are the main characteristics of a useful and effective information in management information systems?(Solved)
What are the main characteristics of a useful and effective information in management information systems?
Date posted: November 18, 2017. Answers (1)
- What are the characteristics and nature of systems?(Solved)
What are the characteristics and nature of systems?
Date posted: November 17, 2017. Answers (1)
- Examine any four weaknesses of a conventional file approach which database systems are meant to address(Solved)
Examine any four weaknesses of a conventional file approach which database systems are meant to address
Date posted: November 17, 2017. Answers (1)
- Highlight the activities performed during systems delivery(Solved)
Highlight the activities performed during systems delivery
Date posted: November 17, 2017. Answers (1)
- Explain the steps that may be taken by the systems administrator to ensure security of password based access control mechanism.(Solved)
Explain the steps that may be taken by the systems administrator to ensure security of password based access control mechanism.
Date posted: November 17, 2017. Answers (1)
- Briefly describe the key features of a product, event or transaction that make it suitable for bar coding(Solved)
Briefly describe the key features of a product, event or transaction that make it suitable for bar coding.
Date posted: November 17, 2017. Answers (1)
- Name six areas covered under post-audit activity.(Solved)
Name six areas covered under post-audit activity.
Date posted: November 17, 2017. Answers (1)
- A software engineer requires a range of software utilities. Explain the usefulness of any three such utilities.(Solved)
A software engineer requires a range of software utilities. Explain the usefulness of any three such utilities.
Date posted: November 17, 2017. Answers (1)
- Outline any anomalies that are associated with redundant data.(Solved)
Outline any anomalies that are associated with redundant data.
Date posted: November 17, 2017. Answers (1)
- Explain the type of information that should be maintained for the post-implementation review of a system.(Solved)
Explain the type of information that should be maintained for the post-implementation review of a system.
Date posted: November 17, 2017. Answers (1)
- Explain three ways in which modern information communication technology (ICT) has affected the portability of information.(Solved)
Explain three ways in which modern information communication technology (ICT) has affected the portability of information.
Date posted: November 17, 2017. Answers (1)
- Define GUI and state its advantages.(Solved)
Define GUI and state its advantages.
Date posted: November 17, 2017. Answers (1)
- Differentiate between open and closed systems.(Solved)
Differentiate between open and closed systems.
Date posted: November 17, 2017. Answers (1)