1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
13

Describe the following types of data hazards. RAW WAR WAW

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
5 0

Answer: Data hazards are the factor behind the damage/problem created in the data of the CPU . There are three types of data hazards which are as follows:-

By considering two element "A" and "B"

  • RAW(Read after write)- If the element A tries to read the value before the element B has written it then element A will receive the previous value which is accordingly incorrect .
  • WAR(Write after read)-Element B write a value for element A which not read by it.So, it incorrectly gets a new destination assigned.
  • WAW(Write after write)-Element B tries to write the value for the element A before element A writes it, thus creating a hazard.

You might be interested in
A school has an intranet for the staff and students to use. Some of the files stored on the intranet are confidential. Give two
lapo4ka [179]

Answer:

explanation below

Explanation:

An intranet could be defined as a computer network that is used for sharing information, operational systems, collaboration tools and other computing tasks within a company or organization such as schools. It is usually structured to exclude excess by those outside of the organization.  

Intranet provides a lot of benefits to organization where it is been used and they are as seen below :

1. Users can effectively update and view their documents with ease – scheduling meetings, managing of classroom curriculum and preparing of projects can be done with less stress.

2. It can be used to keep accurate staff records – employees can have their details rightly stored using the intranet and a photograph can also be used.  

5 0
3 years ago
What is a good safety precaution to take when opening a computer case?
Anna11 [10]

Answer:

Place tape over the case edges that are sharp

6 0
3 years ago
Which of the following statements about wide area networks are true? Select 3 options.
Montano1993 [528]

Answer:

abd

Explanation:

connections usually occur through a public network

cool devices in a large geographic area

typically uses Ethernet and wirless routers to connect device

7 0
3 years ago
Which of the following is a term used for the permanent record of activities performed on the Internet?
Rasek [7]

Answer:   Your history and you can check everything using a MAC or IP password

6 0
3 years ago
This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.1. do-while
Luba_88 [7]

Answer:

Option 3 is the correct answer.

Explanation:

  • In c, c++ or Java programming language, The for loop takes three parameters in which first is an initialization, second is condition check and the third is an increment. None of the other loop (except for loop) takes three parameters. The other loop takes only one parameter and that is the condition check.
  • So when a user knows about the times of iteration then it is a good choice to use the for loop but when the person does not know about the times of iteration if the loop. It means the iteration of the loop is based on the condition then it is a good choice to chose while or Do-while loop.
  • The above question wants to ask which loop for a user can best if he familiar with the iteration of the loop then the answer is for loop which is started from option 3. Hence Option 3 is the correct answer while the other is not because--
  1. Option 1 states about the do-while loop which takes condition only.
  2. Option 2 states about the while loop which also takes condition only.
  3. Option 4 states about the infinite loop which is not any loop.
  4. Option 5 states about none of these which is not correct because option 3 is the correct answer.

6 0
3 years ago
Other questions:
  • Which of the following statements is true?
    14·1 answer
  • Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then st
    14·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • Why do some people think the global<br> economy is good for the United States?
    10·1 answer
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • Which 3D game has Bentley the Bear collect gems while avoiding enemy trees, bees, ghosts, skeletons, and Berthilda the witch?
    9·1 answer
  • I really need this done Thank you!!
    6·1 answer
  • What are some example of popular music for teenagers
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!