1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
13

Given that the time to read data off a 7200 rpm disk drive will be roughly 75% of a 5400 rpm disk, at what idle time of the 7200

rpm disk will the power consumption be equal, on average, for the two disks?
Computers and Technology
1 answer:
Tanzania [10]3 years ago
6 0

Answer:

Given that the time to read data off a 7200 rpm disk drive will be roughly 75% of 5400 rpm disk, at 30% idle time of 7200 rpm disk will the power consumption be equal, on average for the two disk

Explanation:

Let the 7200-disk busy time = x  ( we need to calculate it)

As given in the question the in the given time to read data off a 7200 rpm disk drive will be roughly 75% of 5400 rpm disk. This mean that we equalize the equations of both disk power

7200-disk power      =     5400-disk power

here we apply the formula to calculate the 7200 rpm disk busy time

4.0 * (1-x) + 7.9 * x      =     2.9 * (1-x/0.75) + 7.0 * x/0.75

4.0 + 3.9 x                  =      2.9 – 3.87 x + 9.33 x

1.1                                =        5.47 x – 3.9 x

we calculate the value for x

Hence                   x = 0.70

Applying formula to calculate the idle time.

Idle time = 1.0 – 0.70 = 0.30

You might be interested in
If you added the formula =SUM(B1:B5) to a spreadsheet, what would it do?
Vsevolod [243]

Answer:

C

Explanation:

Since you put "Sum" it will add

8 0
2 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
2 years ago
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
Select the correct answer.
zmey [24]

the answer should be the letter a

3 0
3 years ago
Read 2 more answers
Use the Internet to gather information on four filesystems compatible with Linux. For each filesystem, list the situations for w
marta [7]
If fhun gftrfjjtcbjjbsufcghtfghyrssfbkoire crazy ahh young man
7 0
3 years ago
Other questions:
  • Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pag
    11·1 answer
  • What is the most effect way to include space after each paragraph
    14·1 answer
  • Explain the role of the domain name system
    15·1 answer
  • 1. of the following individuals, who was the most recent to develop information searching tools online? (points : 1) otlet wells
    5·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • You are given 6 training examples for a binary classification problem as follows:
    12·1 answer
  • Who distributes IP Address?
    10·1 answer
  • 2. The Internet could best be described as: *
    12·1 answer
  • You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number
    12·1 answer
  • Write the function powersOf3ToN(n) that takes a possibly-negative float or int n, and returns a list of the positive powers of 3
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!