15.2.3 Data Hazards