With no multithreading, _________ is the simple pipeline found in traditional RISC and CISC machines.
A. superscalar
B. single-threaded scalar
C. blocked multithreaded scalar
D. interleaved multithreaded scalar
B. single-threaded scalar
Computer Science & Information Technology
You might also like to view...
A client wants to take their old VCR tapes and put them on a DVD. Which of the following expansion cards would need to be installed in a computer to perform this task?
A. TV tuner B. Video graphics C. Sound D. Video capture
Computer Science & Information Technology
To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol.
A. eavesdropping B. Trojan horse C. challenge-response D. denial-of-service
Computer Science & Information Technology