The superscalar approach can be used on __________ architecture.

A. RISC
B. CISC
C. neither RISC nor CISC
D. both RISC and CISC

D. both RISC and CISC

Computer Science & Information Technology

You might also like to view...

When a user logs in, you would like the system to first check the local /etc/passwd file for a username and then check NIS. How do you implement this strategy?

What will be an ideal response?

Computer Science & Information Technology

One of the great advantages of ____ references is that you can quickly generate row and column totals without having to worry about revising the formulas as you copy them to new locations.

A. cell B. relative C. absolute D. formula

Computer Science & Information Technology