Answer:
Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.
Explanation:
hope this helps.
Encryption. Using a secret key, the data is encrypted. To decrypt it, the same or a different key is needed. Unauthorised entities should not have such a key.
Answer:
b. lw $t4, 4($t0)
c. add $t3, $t5, $t4
Explanation:
Pipeline hazard prevents other instruction from execution while one instruction is already in process. There is pipeline bubbles through which there is break in the structural hazard which preclude data. It helps to stop fetching any new instruction during clock cycle.