1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
14

The outstanding disk requests are for tracks 6,10,4,20,36,8, and 40 in that order. Assume that the seek time speed is 5 msec/tra

ck, there are 50 cylinders total, and presently the read-write head is at track 15 and moving up towards 50. Calculate the seek time for each of the following scheduling methods.
a. FCFS
b. SSTF
c. C-LOOK
Computers and Technology
1 answer:
kirill [66]2 years ago
4 0

Answer:

a. FCFS

seek: 9+4+6+16+16+28+32 = 111 cylinders, 555 ms

b. SSTF

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

c. C-LOOK

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

Explanation:

a. FCFS: requests are served in the order they are received. It is used when load is low and has long waiting time for long requests queues.

order: (15), 6, 10, 4, 20, 36, 8, 40

seek: 9+4+6+16+16+28+32 = 111 cylinders, 555 ms

b. SSTF: requests are served using shortest seek time first. It minimizes arm movement, and maximizes request rate

order: (15), 20, 36, 40, 10, 8, 6, 4   15 10 8 6 4 40 36 20

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

c. C-LOOK: requests are served in one direction until when done then reverses. It does not go to end of disk.

Assume maximum track is 50 then reverses

order: (15), 20, 36, 40, (50), 10, 8, 6, 4

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

You might be interested in
An array name is a pointer constant because the address stored in it cannot be changed during runtime.
choli [55]
The answer to your question would be option B- False
5 0
2 years ago
Read 2 more answers
Katla is a project manager. One of the programmers on her team comes to her and says that he permanently deleted some code mista
Aleonysh [2.5K]

Answer:

Version Control - Maintains the code log history and changes overtime.

8 0
3 years ago
A network packet contains two kinds of information. What are they?
Salsk061 [2.6K]

Answer:

Connectionless and connection oriented information

Explanation:

There is wireless and wired information in a network so...

6 0
3 years ago
Read 2 more answers
ASAP please
Semenov [28]
I think it’s 4


a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
5 0
2 years ago
Zebadiah is solving which key question of economics?
VARVARA [1.3K]
<span>C. How should goods and services be produced</span>
5 0
2 years ago
Other questions:
  • A ____ is a type of program that uses a grid to organize and work with data.
    14·1 answer
  • What xDSL version provides a maximum throughput of 24 Mbps downstream and 3.3 Mbps upstream?
    9·1 answer
  • The scope of a variable declared outside of any function is:
    11·1 answer
  • Create a program that prints out a list of all the divisors of a number stored in a variable. (If you don’t know what a divisor
    11·1 answer
  • Choose all the items that represent potential ways to find a job opening.
    14·1 answer
  • The number of __________ to your website that had not visited prior to the time frame being analyzed.
    9·1 answer
  • How do i dos someone? I wanna mess with my friend
    10·1 answer
  • Please respond not with answer but with comment.
    12·1 answer
  • What are hard ware and software requirments in multimedia computer system
    5·1 answer
  • An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!