1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
2 years ago
13

Describe the following types of data hazards. RAW WAR WAW

Computers and Technology
1 answer:
aleksandr82 [10.1K]2 years ago
5 0

Answer: Data hazards are the factor behind the damage/problem created in the data of the CPU . There are three types of data hazards which are as follows:-

By considering two element "A" and "B"

  • RAW(Read after write)- If the element A tries to read the value before the element B has written it then element A will receive the previous value which is accordingly incorrect .
  • WAR(Write after read)-Element B write a value for element A which not read by it.So, it incorrectly gets a new destination assigned.
  • WAW(Write after write)-Element B tries to write the value for the element A before element A writes it, thus creating a hazard.

You might be interested in
On mad max ps4, why does the v6 sound beter and healthier than the v8
nadya68 [22]
Um is that a question?

5 0
3 years ago
Which type of chart is best for highlighting trends in data?
STALIN [3.7K]
Pie chart I believe that is the right answer

8 0
3 years ago
Read 2 more answers
To add an animation to a slide in PowerPoint Online, what is the first step you need to complete?
velikii [3]

To add an animation to a slide in PowerPoint Online, what is the first step you need to complete is to Select the Text object.

<h3>How do you  add animations to text?</h3>

The steps are:

  • Select the object or text that is to be animated.

  • Select Animations and then choose the one that you want.

  • Select Effect Options and then choose the one you want.

Note that To add an animation to a slide in PowerPoint Online, what is the first step you need to complete is to Select the Text object as one needs to choose a slide, select an object before one can add animation.

Learn more about animation from

brainly.com/question/18260878

#SPJ1

6 0
1 year ago
Poshmark is more than a shopping app; it connects people and brings them together. Poshmark is a passionate group of people that
babymother [125]

Poshmark is more than a shopping app. It is known to be a shopping applicationthat links a person to other people whose style one likes.

<h3>What is the aim of Poshmark?</h3>

Poshmark is known to be a shopping app that links a person to other people whose style one likes adore.

It is known to help one to easily shop for any of their closets and boutiques needs. They are known to have about 80 million community members in all of the U.S., Canada, and Australia.

learn more about Poshmark from

brainly.com/question/26258231

8 0
2 years ago
Which of the following are reasons why it is important to write readable code?
Julli [10]

Answer:

Readable code is easier to maintain.

Writing readable code saves time in the long run.

Readable code is easier to modify.

Readable code is fun to write.

Explanation:

Readability of a code means that how easy it is to read the code even if any person other than programmer reads the code. Different techniques like line breaks and indentation are used to make the code readable. the program follows an indentation pattern so it is easy and fun to write.

Hence,

it can be concluded that the true statements are:

Readable code is easier to maintain.

Writing readable code saves time in the long run.

Readable code is easier to modify.

Readable code is fun to write.

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following represent typical account fees?
    7·1 answer
  • When approved for a loan, an individual essentially applied for aid in the area of...
    15·1 answer
  • ____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
    11·1 answer
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • Choose a project with a relatively simple description (building a LAN, designing a web page, inventing a new communication devic
    6·1 answer
  • What is the name of the virus that appears to be a legitimate program but when opened
    9·1 answer
  • Cloud computing allows organizations to rent computing resources from providers instead of having their own locally managed ____
    7·1 answer
  • What is internet marketing??
    13·1 answer
  • In 1839, Talbot released the paper-based process which he called _ to the public.
    5·1 answer
  • What number is represented as a binary code of 101110
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!