State whether the following techniques or components are associated primarily with a software- or hardware-based approach to exploiting ilp. in some cases, the answer may be both. 1. branch prediction 2. multiple issue 3. vliw 4. superscalar 5. dynamic scheduling 6. out-of-order execution 7. speculation 8. reorder buffer 9. register renaming patterson, david a.; hennessy, john l.. computer organization and design mips edition (issn) (p. 788). elsevier science. kindle edition.