1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
13

Describe the following types of data hazards. RAW WAR WAW

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
5 0

Answer: Data hazards are the factor behind the damage/problem created in the data of the CPU . There are three types of data hazards which are as follows:-

By considering two element "A" and "B"

  • RAW(Read after write)- If the element A tries to read the value before the element B has written it then element A will receive the previous value which is accordingly incorrect .
  • WAR(Write after read)-Element B write a value for element A which not read by it.So, it incorrectly gets a new destination assigned.
  • WAW(Write after write)-Element B tries to write the value for the element A before element A writes it, thus creating a hazard.

You might be interested in
Which of the following accurately describe the
Ronch [10]

Answer:

I can get a few months ago but the other use of the way you can you are you have a few weeks ago

3 0
3 years ago
Read 2 more answers
Digital signatures are as legally acceptable as written signatures.
Leto [7]

Answer:

First point and the last point are the correct answer to the given question .

Explanation:

The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.

Following are the advantages of the digital signature

  • As compare to the electronic signature the digital signature is more secure then that of.
  • The signer's signature is seen on the digital signatures as the physical proof.
  • Global recognition, and the compliance with the law.

All the other options are incorrect they are not advantage of the digital signature .

4 0
3 years ago
Identify two entities and 2 of their attributes from the given scenario.
polet [3.4K]

Bookstore and BookSearch are the two entities for the given scenario.

Explanation:

  • For the given Book.com virtual store, there can be two entities like Bookstore and BookSearch.
  • Bookstore can have all the details of the books in the virtual store. hence the attributes can be
  • Bookstore attributes: bookname, Authorname, Publisher, Publishedyear, Agegroup, category.
  • BookSearch entity can be used to search the books in the virtual store.
  • Booksearch attributes: bookname, category, bookid, authorname.
8 0
4 years ago
I NEED HELP QUICK
Serjik [45]

Answer: keeps confidential documents secure,

displays a GUI, allocates the computer's resources, and retrieves files

Explanation:

The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.

8 0
3 years ago
Which consol was dominant in the US market between 1993 and 1998
Illusion [34]

i believe the Nintendo 64

8 0
3 years ago
Other questions:
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
    6·1 answer
  • Jayden wants to take a current theme but just change a little bit of it. Complete the steps to help Jayden.
    10·1 answer
  • The time a computer takes to start has increased dramatically, one possible explanation for this is that the computer is running
    6·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • What are the main features cyber law of Nepal​
    13·1 answer
  • How network diagram help in scheduling a project? Draw activity network diagram as per given
    7·1 answer
  • Write a function longer_string() with two string input parameters that returns the string that has more characters in it. If the
    5·1 answer
  • 1. It is acceptable to use a jack that has been
    13·1 answer
  • What are two benefits of defining a function?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!