1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
4 years ago
6

If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s

torage. A file made up of 4097 bytes will use 4096*2=8192 bytes of storage. Knowing this, can you fill in the gaps in the calculate_storage function below, which calculates the storage size needed for a given filesize?
Computers and Technology
1 answer:
spayn [35]4 years ago
4 0

Answer:

For every file size between 1 to 4096 bytes, 4096 bytes of storage will be use. For file size of 4097 to 8192 bytes, 8192 bytes of storage will be used. Therefore for file size between 8193 to 12288 bytes, 12288 bytes of storage will be used

Explanation:

This is means that for every file size between 1 and 4096 bytes, the maximum storage capacity of 4096 bytes at that range will be used in as storage. 1 byte above 4096 bytes, the next 4096 bytes of storage will be used. therefore 1 byte above 8192 bytes, the next 4096 bytes of storage will be used. Therefore, for every 1 to 4096 bytes, 4096 bytes will be used, and above that, the next 4096 byte of storage will be considered in its multiple.

You might be interested in
An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the comp
DerKrebs [107]

Answer:

A) False

Explanation:

Extranet

An extranet acts as a shared network, disseminating information present on the intranet. That is, if a private intranet shares some of its content with other users (be they sellers, customers, etc.), this shared network is what we call the extranet.

Intranet

Today, companies are looking for tools and methods to align internal communication, reduce costs, and centralize information and files. The intranet is one of these tools, which works restricted to a specific audience, such as a company. This way, collaborators can access it with their specific username and password.

The intranet is, then, a closed and internal network, and still allows the use of more communication protocols besides HTTP. Intranet access is typically done on a local server and a local network, which we call LAN, which means Local Area Network installed within the company.

This internal network connects users, allowing information exchange, file and document management, centralizing communication between users. With this tool, you can quickly and securely and efficiently connect companies and departments.

4 0
3 years ago
When a program terminates because a thrown exception is not handled, the program:
castortr0y [4]

Answer:

Option (e)

Explanation:

Option (e) is the answer. It indicates the exception thrown and displays it. It also indicates the place where the exception was thrown ( at what line of the code the exception was thrown )

Option (a) is false as the program which was terminated because of an exception which was not handled doesn't starts automatically.

Option (b) is false as it doesn't opens a dialogue box about running the program another time or anything. It just terminates because of the unhandled exception.

Option (c) is false as it doesn't saves all the output to a disk file called the "runStackTrace.txt".

Option (d) is false as it doesn't open a dialogue box. The program terminates because of the unhandled exception.

4 0
3 years ago
Your customer, Maggie, wants to buy a gaming PC, and she specifically mentions that she wants an Intel CPU and intends to overcl
Ksenya-84 [330]

Answer:

Intel produces a series of unlocked CPU's that can be overclocked. These CPUs are from the "K" or "X" series. Example: Intel Core i9-9900K, Intel Core i9-10940X.

These are the few things that are to be kept in mind while overclocking:

-Motherboard: Motherboard should support overclocking. Example: Intel Z series, most AMD motherboards.

-Cooler: Boosting the clock speed increases the temperature. The cooler has to be upgraded to keep the temperatures low. Example: Water-cooled. Also, the heat sink has to be checked if it's working properly.

-Be ready to test your system in BIOS. Make sure the temperature, voltage, memory speed is stable for the set clock speed.

Explanation:

8 0
3 years ago
Regular maintenance is a key component of automotive lift safety.
NemiM [27]

Answer:TRUE!!!!!!!!!!!!!!!!!!!!!

Explanation:

8 0
3 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
Other questions:
  • What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
    14·1 answer
  • What is the exact number of bits in a memory that contains (a) 128k bits?
    9·1 answer
  • _________ is critical to Amazon's success.<br><br> SCM<br><br> JIT<br><br> ERP<br><br> VMI
    9·1 answer
  • Write the method makeNames that creates and returns a String array of new names based on the method’s two parameter arrays, arra
    9·1 answer
  • NoSQL is a programming language used to create mobile apps.<br> a) True<br> b) False
    13·2 answers
  • PYTHON Write a grade program using a function called computegrade that takes a score as its parameter and return a grade as a st
    8·1 answer
  • Mary can view the thumbnails of her presentation slides when she’s creating the slides which element of the programs interface i
    8·1 answer
  • How do I start conversations with ppl??? If u answer right I will try send u more points... So please help me
    7·1 answer
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • Instructions
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!