1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
14

For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache

Computers and Technology
2 answers:
Charra [1.4K]3 years ago
6 0

Disk access is way slower than memory access. Caching is a technique to improve the disk access time.  Block cache is a caching technique which reduces disk accesses time.  Here a portion of disk is bought to cache for reading and a modified blocks are first changed in cache but reflected in the disk at one go.  On the other hand with write through caching each modified block is written to cache and at the same time it is written to the disk.  Write- through caching requires more disk I/O so they can have a negative effect on the performance. 

Stolb23 [73]3 years ago
3 0

Answer:

block cache

Explanation:

    An integrated cache is a layer of memory that automatically caches frequently accessed data through the source database.

    Block cache is used to store blocks read from disks. This means that a small buffer cache will cause Oracle to cache data blocks following the LAST RECENTLY USED list, and depending on how often this happens, can lead to a drop in performance.

    There is no magic to sizing the block cache, what you usually do is estimate an initial size and monitor the hit, if it is not optimal, you will need to lengthen and repeat the monitoring cycle.

You might be interested in
What does limited access to a document mean?
OverLord2011 [107]
Limited access to a document usually means that the creator of the document is able to limit how much access one person is able to get.
8 0
3 years ago
Read 2 more answers
A technician is assigned a task to configure a new server with six hard drives. The senior administrator requested the technicia
Doss [256]

Answer:

The answer is "Option C".

Explanation:

It is a way of saving data for additional protection, and it provides an efficiency to connect the lots of hard discs. It uses the optimization techniques, named stages, which is used in unique counts, that will be considered from 0 to 9, and other were incorrect, that can be described as follows:

  • The RAID 3 offers synchronization rotation to all discs.
  • The RAID 5 uses parallel disc patterning.
  • The RAID 0 divides data into the blocks.
4 0
3 years ago
Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
sdas [7]

Solution:

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the bits per seconds.

Thus this is the required answer.

6 0
3 years ago
A(n _______________ is a pre-written formula that is built into excel
nevsk [136]
<span>A function is a pre-written formula that is built into excel.
There are many functions which are pre-written into excel.
Some examples are the SUM function which adds the values in a given range. The AVERAGE function takes the average of values in a given range, etc.
</span>
8 0
3 years ago
A(n) _______________ loop usually occurs when the programmer forgets to write code inside the loop that makes the test condition
Serggg [28]
Infinite





,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
5 0
3 years ago
Other questions:
  • You can use ???? a to test tread wear on your tires
    14·2 answers
  • The first time you start Outlook on a home computer, the ____ feature guides you to provide information that Outlook needs to se
    11·1 answer
  • What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name?
    8·2 answers
  • While working a night job at a call center, Eric creates an app called EatOut, which can be used to place orders at restaurants,
    14·1 answer
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • Define a constructor as indicated. Sample output for below program:Year: 0, VIN: -1Year: 2009, VIN: 444555666// ===== Code from
    8·1 answer
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • Set screw compression and indenter are all types of
    13·2 answers
  • View which is used to specify the tables fields , their data types and properties ​
    9·2 answers
  • The _____ method randomly rearranges the items in the list provided in the parentheses.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!