1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
2 years ago
11

a cisc-style instruction set has a large number of high-level instructions that perform highly complex operations in a single st

ep. what would be the major advantages of such a design? what would be some of the primary disadvantages?
Computers and Technology
1 answer:
NikAS [45]2 years ago
8 0

Both desktop and laptop computers employ CISC (complex instruction set computer) CPUs. Small programs are on CISC machines. It requires a lot of time to execute because it contains a great deal of compound instructions.

<h3>What do you mean by CISC?</h3>

Both desktop and laptop computers employ CISC (complex instruction set computer) CPUs. More complex instructions can be processed by this kind of CPU. For instance, a single instruction might load two values, add them, and then store the outcome back in memory.

A computer that, in contrast to a computer with a limited instruction set, allows individual instructions to perform numerous processes and need a large number of cycles to complete (RISC).

Small programs are on CISC machines. It requires a lot of time to execute because it contains a great deal of compound instructions. In this case, a single set of instructions is safeguarded in stages; each instruction set contains more than 300 distinct instructions. On average, instructions take two to ten machine cycles to complete.

To learn more about CISC refer to:

brainly.com/question/13266932

#SPJ4

You might be interested in
How do you determine if a name is a variable holding a value or if it is a function call?
11Alexandr11 [23.1K]

The way to determine if a name is a variable holding a value or if it is a function call is by:

  • Instance variables are prefixed with self.

<h3>What is this call about?</h3>

A function call is known to be a kind of an expression that has the function name which is said to be accompanied by the function call operator, () .

Note that The way to determine if a name is a variable holding a value or if it is a function call is by:

  • Instance variables are prefixed with self.

See full question below

How do you determine if a variable in a method is an instance variable for the class?

a) Instance variables have leading underscores in their names.

b) Instance variables are prefixed with self..

c) Instance variables start with a capital letter.

d) all of the above

e) none of the above

Learn more about function call from

brainly.com/question/15071685

#SPJ11

5 0
2 years ago
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
Which term is used to describe a computer-based method of communication in which users can type and view informal messages sent
Vsevolod [243]
The answer is instant messaging (IM).  This  is used to describe a computer-based method of communication in which users can type and view informal messages sent to one or more recipients, and view the responses immediately.  Instant Messaging (IM) <span>is a type of online chat that offers real-time text transmission over the Internet. </span>
3 0
4 years ago
How does lower latency benefit the users connected to a network?
storchak [24]

Answer: Low latency in network connection refers to a minimal delay in processing computer data over the connection. Lower latency in the network provides closer real-time access with minimal delay times. High latency occurs when it takes longer for a packet of data to be sent to a physical destination.

Explanation:

3 0
3 years ago
Here is over 40pts as Promised? :)<br> Who invented the Lamborghini?
nordsb [41]

Ferruccio Lamborghini

He is the creator/inventor of the Lamborghini.

3 0
4 years ago
Read 2 more answers
Other questions:
  • Why should you avoid the use of sarcasm cliches and idioms in busniess letters?
    9·2 answers
  • What is the number one drug used by teens?
    7·2 answers
  • ASAP
    12·2 answers
  • _______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
    5·1 answer
  • What do you like most about brainly?
    13·2 answers
  • Jamie posted all the journal entries into ledgers. After the postings, Jamie realizes that the debit side of the travel account
    10·1 answer
  • Zack is taking a survey that contains questions about his future plans. Which question would most likely be on the survey?
    9·2 answers
  • Write a couple of paragraphs about the usefulness of computer​
    5·1 answer
  • What is the name of tool
    11·1 answer
  • According to institutional anomie theory, why is there a need to maintain cooperation between economic and non-economic institut
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!