in lectures, we discussed about the possibilities of data hazards with respect to war, raw, waw. 11/5/22, 4:34 pm midterm: computer architecture https://canvas.ucsc.edu/courses/52599/quizzes/72511 3/14 but what about the possibility of a rar (read after read) data hazard operating on a certain data in the pipeline?