Categories
Computer Science

RISC architecture in memory access is limited to instructions

A:  CALL and CLEAR
B:  USH and POP
C:  STA and LDA
D: MOV and JMP

Leave a Reply

Your email address will not be published. Required fields are marked *