The superscalar approach can be used on __________ architecture.

A. RISC
B. CISC
C. neither RISC nor CISC
D. both RISC and CISC


D. both RISC and CISC

Computer Science & Information Technology

You might also like to view...

What is wrong in the following code?

``` #include #include using namespace std; int main() { vector v; cout << v[0]; return 0; } ``` a. The program has a compile error on v[0]. b. The program has a runtime error on vector v. c. The program has a runtime error on v[0], because the vector is empty. d. The program has a compile error on vector v.

Computer Science & Information Technology

Describe one benefit of Filesystem Hierarchy Standard (FHS).

What will be an ideal response?

Computer Science & Information Technology

It is more efficient to copy and use an existing query for a new query when:

A) the query criteria needed will be unique to the original query. B) the query will be sorted alphabetically. C) the query will be deleted after it is run. D) the query criteria needed will be similar to the original query.

Computer Science & Information Technology

A ________ data value is formed following a system of rules where the position of information is tied to its context

A) codified B) conditional C) restrictive D) logical

Computer Science & Information Technology