1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
6

Contiguous allocation of files leads to disk fragmentation, as mentioned in the text, because some space in the last disk block

will be wasted in files whose length is not an integral number of blocks. Is this internal fragmentation or external fragmentation
Computers and Technology
2 answers:
makvit [3.9K]3 years ago
8 0

Answer:

The answer is internal fragmentation.

Explanation:

Internal fragmentation occurs when a process needs more space than the size of allotted memory block because of the contiguous allocation of files.

On the other hand, external fragmentation occurs when a process is removed from the main memory. There are non-contiguous allocation of files that make memory blocks cannot be assigned to any process.

pashok25 [27]3 years ago
6 0

Answer:

Disk Fragmentation  

Disk fragmentation is one of the issues of the working framework. Disk fragmentation happens inside the record when the single document isn't situated in the equivalent physical memory area on the disk space and is spread around the disk. Disk fragmentation is fundamentally of two sort's to be specific outside fragmentation and the inward fragmentation. An outside fragmentation is one that alludes to the irregular access memory the executives with little and unused openings that are dissipated all through the plate. An inside fragmentation is one that incorporates a paging plan in the working framework.  

Accordingly the capacity that is squandered, is available in the middle of the designation units of records, and is absent inside the documents therefore this is called as the outer fragmentation. As, the technique is decisively similar to fundamental memory outside fragmentation in this manner it happens with the framework swapping or utilizing the frameworks unadulterated division.

You might be interested in
What are the modes of operation of WLANs?
Nimfa-mama [501]

Answer:

WLAN's or Wireless LAN Units have 2 main modes of operation

Explanation:

The Two Main modes of Operation are the following

<u>Infrastructure Mode:</u> in this mode the main WLAN unit becomes the main connection point in which all devices are connected to and the main unit provides an internet connection to all the devices connected to it.

<u>Ad Hoc Mode:</u> in this mode devices transfer data from one another back and forth without permission from a base unit.

Some WLAN units will also include 2 extra modes of operation called Bridge and Wireless Distribution System (WDS).

<u>Bridge Mode:</u> this mode allows the base unit to act as an intermediary and bridge two different connection points. Such as bridging a wired connection with a wireless one.

<u>WDS Mode:</u> this mode uses various access points to wirelessly interconnect devices to the internet using repeaters to transmit connections. It can provide internet to both wired and wireless clients.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
(01.01 LC)
zloy xaker [14]

Answer:

Create web and mobile applacations

Explanation:

6 0
3 years ago
Which formula is a simple formula?<br> O =E10/5+1<br> 0 -5+A1*B1<br> O =C3+10-E3<br> 0 =10-(A3-D13)
steposvetlana [31]

Answer:

O =C3+10-E3

Explanation:

Only addition and subtraction :D

8 0
2 years ago
PLEASE HELP ME! Will report ignorant answers!
kaheart [24]

Answer:

It is important so your computer can function properly. the two things that might happen if they are not compatible are that it might crash your computer and that your computer might not function properly.

5 0
3 years ago
Please help me i will award brainliest
Sergio [31]

Answer: It would be option C.

Explanation: The file name is invalid, so therefore it would make sense to rename the most recent version correctly.

8 0
3 years ago
Other questions:
  • What menu allows you to look up a command and learn how to use it?
    14·1 answer
  • I have tried installing "windows media player" on my computer but at a point, something disrupts its instalment or I am asked to
    7·1 answer
  • The first version of the SMTP protocol was defined in RFC 821. The current standard for SMTP is defined in RFC 5321 considering
    11·1 answer
  • How would you compare and contrast the impact of the printing press with the impact of the internet?
    15·1 answer
  • Information is best described as
    10·1 answer
  • What is the difference between private inheritance and composition?
    11·1 answer
  • Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that i
    6·1 answer
  • Defination of formula work sheet​
    15·1 answer
  • _____________are where you get down to business and enter data in a worksheet
    12·1 answer
  • Computers rarely make mistakes. True or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!