1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
13

Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos

e the physical location of logical blocks. b. the operating systems may have other constraints such as writes may be more urgent than reads. c. rotational latency is insignificant compared to the average seek time. d. it is difficult to optimize seek time in disk hardware.
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
4 0

Answer:

a. modern disks do not disclose the physical location of logical blocks.

Explanation:

In modern disks, the disk scheduling algorithms are built in the disk drive. It is difficult for operating system to schedule for improved rotational latency. All scheduling algorithms are forced to behave the same because operating system may have constraints. Disks are usually accessed in physical blocks. Modern disks put more electronic controls on the disk.

You might be interested in
Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
Alla [95]

Answer:

The type of attack is <em>Phising Email.</em>

<em />

Explanation:

Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.

5 0
3 years ago
If you receive an increase in pay, how will that affect your payroll deductions?
spin [16.1K]
No it will actually help it
3 0
3 years ago
Evaluate and compare free and commercial versions of the Avast antivirus software
Ivan

Answer:

Explanation:

Explanation:

Explanation:

Explanation:

Explanation:

Explanation:

8 0
2 years ago
I'm 11, except my profile says I'm 15.
aleksandr82 [10.1K]

Answer:

Hello there, I dont think there is a way to change you age, but maybe you shall try again tomorrow and see if an error message pop up.  If the Error Message pops up, contact custumaor support!

Glad I could Help!

3 0
3 years ago
What is the formula equivalent to the function =SUM(B1:B5)? A. =B1+B5 B. =$B$1+$B$5 C. =B1+B2+B3+B4+B5 D. =$B$1+$B$2+$B$3+$B$4+$
Contact [7]

Given the options, I would choose Option C. =B1+B2+B3+B4+B5.

5 0
3 years ago
Other questions:
  • Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he
    14·2 answers
  • WILL DO A BRAINLY! help pls.
    15·1 answer
  • Why was the term personal computer created?
    5·1 answer
  • What country is now the number one source of attack traffic?
    5·1 answer
  • Which software can managers use to discuss financial performance with the help of slides and charts?
    7·2 answers
  • What is a strictly layered pattern, provide an example of its usage.
    13·1 answer
  • Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information f
    8·1 answer
  • Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?
    13·2 answers
  • There are many best practices for digital recordings. Select the three best practices from the list below. select the best micro
    14·1 answer
  • 5. Give one word answers:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!