1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
4 years ago
7

Contrast the performance of the three techniques for allocating disk blocks (contiguous, linked, and indexed) for both sequentia

l and random file access. [12 marks]
Computers and Technology
2 answers:
sladkih [1.3K]4 years ago
5 0

Answer:

There are three main disk space or file allocation methods.  

• Contiguous Allocation  

• Linked Allocation  

• Indexed Allocation

By the performance level  

Contiguous allocation > linked Allocation > Indexed Allocation

Contiguous is faster than linked allocation and both contiguous and linked are faster than indexed.

As  linked allocation does not support direct access and the indexed allocation , the pointer of it is bigger than linked allocation  

Explanation:

1.Contiguous Allocation :

In this scheme, each file occupies a contiguous set of blocks on the disk.

> It supports both accesses (sequential and direct)

> Its extremely fast as the number of seeks are minimal because of contiguous allocation of file blocks.

but on the other hand it has some disadvantages as

> It can not deal with fragmentation whether its external or internal.

> And also increasing the size of it may get difficult.

2. Linked Allocation:

In this type of allocation, each file is a linked list of disk blocks and the disk blocks can be scattered anywhere on the disk.

> This type is very flexible with the file size.  

> This method also does not suffer from external fragmentation. This makes it better in terms of memory utilization.

> It does not support random or direct access while it slightly support sequential access.

3. Indexed Allocation:

There is a special block known as the Index block contains the pointers to all the blocks occupied by a file in this type of allocation. Each file has its own index block.  

> This type supports direct access therefore provides fast access to the file blocks.  

> It also overcomes with the problem of external fragmentation.

Pie4 years ago
3 0
The allocation methods define how the files are stored in the disk blocks.
There are three main disk space or file allocation methods:
1.Contiguous Allocation-in this scheme,each file occupies a set of blocks on the disk. For example if a file requires x blocks and is given a block y as the starting location,then the blocks assigned to the file be :x,y+1,y+2,......y+x-1.
This means that given the starting block address and the length of the file(in terms of blocks required) we can determine the blocks occupied by the file.
Advantages
-both the sequential and direct accesses are supported
-this is extremely fast since the number of seeks are minimal because of contiguous allocation of file blocks.
2.linked allocation-in this scheme,each file linked list of disk blocks which need not  be contiguous disk blocks can be scattered anywhere on the disk.
Advantages
it is very flexible in terms of file size.file size can be increased easily since the system does not have to look for a contiguous chunk 
of memory.
this method does not suffer from external fragmentation and it makes it relatively better in terms of memory utilization.
3.Indexed Allocation-in this scheme,a special block known as the index block contains the pointers to all the blocks occupied by a file.Each file has its own index block.the entry in the index block contains the disk address of the block
Advantages
it supports direct access to the blocks occupied by the file and therefore provides fast access to the file blocks
it overcomes the problem of external fragmentation.
You might be interested in
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
To enforce the concept of separating class definition from its function implementations, where should the function implementatio
zzz [600]
D(in a .c file ) because that is where it should be placed :)
4 0
3 years ago
1. in terms of technology, we often said to be living in the _____ age.???
sleet_krkn [62]
I think its the new age either that or end times
3 0
3 years ago
Read 2 more answers
Select the correct answer.
BigorU [14]

Answer:

A

Explanation:

This Information involves informing the young youth about adult and mature life

5 0
3 years ago
Read 2 more answers
What target audience does your product serve?
Natasha_Volkova [10]

Answer:

A target audience is the demographic of people most likely to be interested in your product or service. For example if you own a plumbing company, the target audience is property owners, both commercial and residential.

7 0
3 years ago
Other questions:
  • How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? what system transl
    11·1 answer
  • Create a program the outputs the total cost of a lunch order. Users should be prompted to input the number of hamburgers, fries,
    6·1 answer
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • Refer to the exhibit. the gigabit interfaces on both routers have been configured with subinterface numbers that match the vlan
    11·1 answer
  • Identify the false statement.
    8·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • Is it true or false and incomplete doing can be saved in Paint​
    15·1 answer
  • The purpose of Appetizers on the menu​
    6·2 answers
  • If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
    11·1 answer
  • Animals living in burrows under the ground is an interaction between the biosphere and the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!