1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
14

For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache

Computers and Technology
2 answers:
Charra [1.4K]3 years ago
6 0

Disk access is way slower than memory access. Caching is a technique to improve the disk access time.  Block cache is a caching technique which reduces disk accesses time.  Here a portion of disk is bought to cache for reading and a modified blocks are first changed in cache but reflected in the disk at one go.  On the other hand with write through caching each modified block is written to cache and at the same time it is written to the disk.  Write- through caching requires more disk I/O so they can have a negative effect on the performance. 

Stolb23 [73]3 years ago
3 0

Answer:

block cache

Explanation:

    An integrated cache is a layer of memory that automatically caches frequently accessed data through the source database.

    Block cache is used to store blocks read from disks. This means that a small buffer cache will cause Oracle to cache data blocks following the LAST RECENTLY USED list, and depending on how often this happens, can lead to a drop in performance.

    There is no magic to sizing the block cache, what you usually do is estimate an initial size and monitor the hit, if it is not optimal, you will need to lengthen and repeat the monitoring cycle.

You might be interested in
What is the difference between ARM and INTEL Chip?
tia_tia [17]
With the ever-present rumor of ARM MacBooks<span> gaining renewed energy, it’s time to get an understanding of the technical differences between ARM processors and the more common x86 processors made by </span>Intel<span> and AMD.</span>
8 0
3 years ago
What should you call a person who has permission to bypass the security of a computer to access it
Sav [38]

Answer:

Administrator

Explanation:

Such permission to bypass the security of a computer to access it is being given to only the administrator. No other user is allowed to have such privileges. And there is only one administrator in a team, and this is the standard as only then the security of a network of computers, and a particular computer can be ensured. And the correct answer to this question is certainly the Administrator.

7 0
2 years ago
In which type of network can a computer upload and download data at the same time?
REY [17]

answer is peer-to-peer


hope this helps

8 0
3 years ago
You are trying to sell a new product to a store owner. Which method of presentation is likely the most effective?
Elina [12.6K]
D. Because if you show the owner the graph he'Il be impressed so he'll obviously want proof so show him the other store owners success quotes and then for him to trust you, Give him a trial of the product
5 0
3 years ago
Read 2 more answers
Which of the following statements is most true? A user's online identities, actions, and relationships rarely have consequences
ale4655 [162]

Answer:

Online activities are increasingly used to make real-world decisions.

Explanation:

People use increasingly <em>world wide web</em>. They create profiles and communicate with others on social networks, share thoughts and moments of their life on online platforms.

These <em>online</em> activities become part of one's identity. Therefore these activities can give information about user's behaviors, attitudes, likes and dislikes.

All this data are being used to make real world decisions about a user or a group of users. For example, trough one's online check-ins, frequently used location of the users or can be determined. Similarly, trough social media likes or posts, one's hobbies can be predicted.

Therefore, social media and online presence in general, is not necessarily safe or private but important places which have valuable information of the users that can be used in real world.

8 0
3 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • Mobile devices need to work within limited screen space .
    11·1 answer
  • Which of the following statements about the break statement is false? Group of answer choices Common uses of the break statement
    12·1 answer
  • What should you do if your computer is running slower
    12·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
  • Which four of the following qualify as fair use?
    11·2 answers
  • Python Coding:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!