Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

The technique whereby the DMA controller steals the access cycles of the processor to operate is called __________

a) Fast conning
b) Memory Con
c) Cycle stealing
d) Memory stealing

Answer: c
Explanation: The controller takes over the processor’s access cycles and performs memory operations.

Join The Discussion