1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
7

Contrast the performance of the three techniques for allocating disk blocks (contiguous, linked, and indexed) for both sequentia

l and random file access. [12 marks]
Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
5 0

Answer:

There are three main disk space or file allocation methods.  

• Contiguous Allocation  

• Linked Allocation  

• Indexed Allocation

By the performance level  

Contiguous allocation > linked Allocation > Indexed Allocation

Contiguous is faster than linked allocation and both contiguous and linked are faster than indexed.

As  linked allocation does not support direct access and the indexed allocation , the pointer of it is bigger than linked allocation  

Explanation:

1.Contiguous Allocation :

In this scheme, each file occupies a contiguous set of blocks on the disk.

> It supports both accesses (sequential and direct)

> Its extremely fast as the number of seeks are minimal because of contiguous allocation of file blocks.

but on the other hand it has some disadvantages as

> It can not deal with fragmentation whether its external or internal.

> And also increasing the size of it may get difficult.

2. Linked Allocation:

In this type of allocation, each file is a linked list of disk blocks and the disk blocks can be scattered anywhere on the disk.

> This type is very flexible with the file size.  

> This method also does not suffer from external fragmentation. This makes it better in terms of memory utilization.

> It does not support random or direct access while it slightly support sequential access.

3. Indexed Allocation:

There is a special block known as the Index block contains the pointers to all the blocks occupied by a file in this type of allocation. Each file has its own index block.  

> This type supports direct access therefore provides fast access to the file blocks.  

> It also overcomes with the problem of external fragmentation.

Pie3 years ago
3 0
The allocation methods define how the files are stored in the disk blocks.
There are three main disk space or file allocation methods:
1.Contiguous Allocation-in this scheme,each file occupies a set of blocks on the disk. For example if a file requires x blocks and is given a block y as the starting location,then the blocks assigned to the file be :x,y+1,y+2,......y+x-1.
This means that given the starting block address and the length of the file(in terms of blocks required) we can determine the blocks occupied by the file.
Advantages
-both the sequential and direct accesses are supported
-this is extremely fast since the number of seeks are minimal because of contiguous allocation of file blocks.
2.linked allocation-in this scheme,each file linked list of disk blocks which need not  be contiguous disk blocks can be scattered anywhere on the disk.
Advantages
it is very flexible in terms of file size.file size can be increased easily since the system does not have to look for a contiguous chunk 
of memory.
this method does not suffer from external fragmentation and it makes it relatively better in terms of memory utilization.
3.Indexed Allocation-in this scheme,a special block known as the index block contains the pointers to all the blocks occupied by a file.Each file has its own index block.the entry in the index block contains the disk address of the block
Advantages
it supports direct access to the blocks occupied by the file and therefore provides fast access to the file blocks
it overcomes the problem of external fragmentation.
You might be interested in
No links, thank you
Andrei [34K]

Answer:

The most direct effect that the internet has had on retail sales is THE DEVELOPMENT OF E-COMMERCE.

E- Commerce refers to the commercial transactions that are conducted via the internet. The advance in technology has makes it possible for the retailers to advertise their products and get across to the consumers via the internet. Buying and selling on the internet is now more preferable to most people than the traditional buying and selling because of its convenience.

4 0
2 years ago
Which of the following is NOT a network configuration?
wariber [46]
It's definitely not ring or bus either mesh or Ethernet
4 0
3 years ago
Read 2 more answers
The product of joint force development is a _____________.
sleet_krkn [62]

Answer:

trained and capable joint force.

Explanation:

The joint force development policy is in regards to the training and recruitment of military officials, to improve or promote the growth and speedy development of recruits in the United States military.

Several aspects of military training are given to officials by joint parties from different but collaborating organizations. Joint education, deployment, and dissemination of employment various members of the armed forces are encouraged.

7 0
3 years ago
2.19.5: Circle Pyramid 2.0
liubo4ka [24]

Answer:

def move_to_row(num_circle):

x_value = -((num_circle*50)/2)

y_value = -250 +(50*row_value)

penup()

setposition(x_value,y_value)

pendown()

def draw_circle_row(num_circle):

for i in range(num_circle):

endown()

circle(radius)

penup()

forward(diameter)

#### main part

speed(0)

radius = 25

diameter = radius * 2

row_value = 1

num_circle = int(input("How many circle on the bottom row? (8 or less): "))

penup()

for i in range(num_circle):

move_to_row(num_circle)

row_value=row_value+1

draw_circle_row(num_circle)

num_circle=num_circle-1

8 0
3 years ago
_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network
Dmitriy789 [7]

Answer:

Drive-by hacking

Explanation:

Drive-by hacking simply put is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Hackers are always and constantly in need of ways to install malware on your computer. They of make use of email, shady executable files and Internet web pages. A drive-by download is one method that uses the Internet and web pages to install malicious software on your computer.

The aim is to to remotely attack your data either to steal information or to disrupt operations.

4 0
3 years ago
Other questions:
  • why is it important to use a general search engine, like GOOGLE, to look up the name of the organization, institution, agency or
    7·1 answer
  • List three advantages of using computers for weather forecasting instead manual system
    11·1 answer
  • How much time does a gold chest take to open
    11·1 answer
  • The Internet began when a large company wanted to sell products online
    15·1 answer
  • The growing network of physical objects that will have sensors connected to the Internet is referred to as the ________.
    13·1 answer
  • What is rapid prototyping?​
    11·1 answer
  • Which one is the answer for the question.
    11·1 answer
  • Create a program that simulates a race between several vehicles. Design and implement an inheritance hierarchy that includes Veh
    11·1 answer
  • What company was affected by the cloudbleed vulnerability?
    14·1 answer
  • Any changes done to the software during the operational phase of the software before project wind up is called as maintenance. S
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!