State whether the following techniques or components are associated primarily with a software- or hardware-based approach to exploiting ilp. In some cases, the answer may be both. 1. Branch prediction 2. Multiple issue 3. Vliw 4. Superscalar 5. Dynamic scheduling 6. Out-of-order execution 7. Speculation 8. Reorder buffer 9. Register renaming patterson, david a. ; hennessy, john l. Computer organization and design mips edition (issn) (p. 788). Elsevier science. Kindle edition