_________ instructions are used to position quantities in registers temporarily for computational operations.

A. Load-and-store
B. Window
C. Complex
D. Branch

A. Load-and-store

Computer Science & Information Technology

You might also like to view...

A systems administrator wishes to improve security in a datacenter. The administrator wants to be alerted whenever a hard drive is removed from the server room. Which of the following security measures would BEST accomplish this?

A. RFID chips B. Security cameras C. Server and cabinet locks D. Mantrap E. Proximity reader

Computer Science & Information Technology

You are working on a computer and you think that the browser has been hijacked by malware. Which of the following should you keep an eye out for in this situation?

a. Check to see if a default gateway has been added b. Check the proxy settings in your browser c. Check to see if NAT has been disabled d. Check for a new browser that has been installed

Computer Science & Information Technology