4.8 Introduction to RISC and CISC architectures