The superscalar approach can be used on __________ architecture.
A. RISC
B. CISC
C. neither RISC nor CISC
D. both RISC and CISC
D. both RISC and CISC
Computer Science & Information Technology
You might also like to view...
When a user logs in, you would like the system to first check the local /etc/passwd file for a username and then check NIS. How do you implement this strategy?
What will be an ideal response?
Computer Science & Information Technology
One of the great advantages of ____ references is that you can quickly generate row and column totals without having to worry about revising the formulas as you copy them to new locations.
A. cell B. relative C. absolute D. formula
Computer Science & Information Technology