1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
2 years ago
12

Ignoring overhead for directories and file descriptors, consider a file system in which files are stored in blocks of 16k bytes.

for each of the following file sizes, calculate the percentage of wasted file space due to incomplete filling of the last block: 41,600 bytes; 640,000 bytes; 4.064,000 bytes.
Computers and Technology
1 answer:
irga5000 [103]2 years ago
7 0

File size 41,600 bytes 640,000 bytes

You might be interested in
A series circuit contains a generator, two devices, and connecting wires. The resistances of the two devices are 15 ohms and 10
rjkz [21]
We know, Voltage drop = Voltage * Resistor / total resistance
Here, voltage = 75 V
Resistor for cal. = 10 Ohm
Total resistance = 10 + 15 = 25 Ohm

Substitute their values,
e = 75 * 10/25
e = 3 * 10
e = 30 V

In short, Your Answer would be Option B

Hope this helps!
6 0
4 years ago
Read 2 more answers
When creating an electronic slide presentation, Eliza should ensure that her presentation contains
kondor19780726 [428]

Answer: C) only one main idea on each slide.

Eliza needs to be able to use her electronic slide presentation to convey what the purpose of the presentation is. By providing one main idea on each slide, this would show the audience of Eliza exactly what she wants to convey to them. This would also help her audience get on board of what the whole idea of the presentation is.

8 0
3 years ago
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
Can someone help me with this error? Will give brainliest and i will give more details if you need just please help​
liubo4ka [24]

Answer:

From what I see, you're trying to convert an int to a double&. This is illegal. Do you have any arrays with ints?

8 0
3 years ago
Pls help me pls I’m struggling
evablogger [386]

Answer:Turn Right () Degrees (block)

The turn right () degrees block is a Motion block and a stack block. The block turns its sprite's direction the specified amount of degrees clockwise.

6 0
3 years ago
Other questions:
  • Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
    15·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • Chevening is looking for individuals with strong professional relationship building skills, who will engage with the Chevening c
    15·1 answer
  • Which scenario shows the best example of intrinsic motivation?
    13·2 answers
  • Your Google Search text ad has three main components. The first is a headline, and the second is a description. What's the third
    14·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • What is the purpose of a poster frame?
    5·2 answers
  • This shows you where text will appear as you type.
    14·1 answer
  • 10. Why antivirus is needed to be installed in computer system?
    8·1 answer
  • PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!<br><br><br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!