1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
3 years ago
14

Explain the RISC and CISC architecture. Comparison of RISC and CISC in detail.

Computers and Technology
1 answer:
puteri [66]3 years ago
6 0

Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.

RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of  control unit,micro program control memory, cache, instruction and data path and main memory.

The differences between RISC and CISC are as follows:-

  • The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
  • The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
  • The execution of RISC is faster as compared to CISC.
  • RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .

You might be interested in
Write a function named wordLineCount with the following input and output: Input: a string parameter, inFile, that is the name of
Galina-37 [17]

Answer:

def wordLineCount(file):

   dic = {}

   with open(file,'r') as file:

       

       text = file.read()

       text = text.strip().split()

       for word in text:

           if word in dic:

               dic[word] += 1

           else:

               dic[word] = 1

   return dic

print(wordLineCount('ben.txt'))

Explanation:

The programming language used is python.

The program starts by defining the function, an empty dictionary is created to hold the words and the number of times that they occur. the with key word is used to open the file, this allows the file to close automatically as soon as the operation on it is finished.

The data in the file is read to a variable text, it is striped from all punctuation and converted to a list of words.

A FOR loop and an if statement is used to iterate through every word in the list and checking if they are already in the dictionary. if the word is already contained in the dictionary, the number of occurrences increases by one. otherwise, it is added to the dictionary.

check the attachment to see code in action.

6 0
4 years ago
You manage an NLB cluster composed of three servers: Server1, Server2 and Server3. Your maintenance schedule indicates that Serv
hoa [83]

Answer:

Drainstop

Explanation:

When the stop command is used through Network Load Balancing or NLB manager, it interrupts all client connection in progress on that server. However, the drainstop command does not interrupt any active connection on the server, but instead allow the host to service active connection, but ensures that all new traffic are disabled from the host or server. From the question, since the aim is not to interrupt the any clients currently being served by Server 1, the drainstop command is the ideal command.

4 0
3 years ago
Your boss has asked you to create a customized letterhead for the business, "Boyne Mountain Ski Shop". Explain how to create the
lakkis [162]

Creating a letter head is very simple. However, you need to do some planning. You are required to pick a size and shape accordingly. I would prefer a landscape oriented rectangle. Select a theme appropriate and consistent with the traits of you company. Personalize with a simple and sleek image that can be printed easily if necessary. Select a font that is bold enough, readable, and eye catching. You can include items like a slogan, a name, phone numbers, address, email address, a link to you web address and the established dates.

5 0
3 years ago
What would best describe the future of cybersecurity?
Andrei [34K]

The best describe the future of cybersecurity is strong security policies offer little protection.

<h3>What is cybersecurity?</h3>

Cybersecurity is the security of data or computer systems. Cybersecurity is provided from the hackers that hacks the data and money online.

As everything is converting digital, the need of cybersecurity is increasing.

Thus, the correct option is B.

Learn more about cybersecurity

brainly.com/question/27560386

#SPJ1

5 0
2 years ago
1. Given two relations R1 and R2, where R1 contains N1 tuples and R2 contains N2 tuples, and N2&gt;N1&gt; 0, give the maximum an
Anna007 [38]

Answer:

Explanation:

A. Max is correct But min will be max(N1,N2) i.e. N2.

B. max=N1, min=0(no common tuples in R1 and R2)

C. max=N1(R1 and R2 are disjoint sets), min=0(all tuples of R1 are present in R2)

D. max=N1*N2, min=N1*N2

6 0
4 years ago
Other questions:
  • Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
    15·1 answer
  • _______________ bytes of storage are needed to represent the name "sarah." two three five ten
    7·1 answer
  • What can be used to provide a checklist of user tasks that must be included in the interface design?
    6·1 answer
  • Why do hard drives tend to slow down over time?
    11·2 answers
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Use the Law of Sines to solve the triangle. Round your answers to two decimal places.
    6·1 answer
  • How does AI use data
    7·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • Which of the following is a good conductor of electricity and heat?
    13·2 answers
  • Html specifications that are not included when newer specifications are released or are not included in the xhtml specification
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!