1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
13

Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos

e the physical location of logical blocks. b. the operating systems may have other constraints such as writes may be more urgent than reads. c. rotational latency is insignificant compared to the average seek time. d. it is difficult to optimize seek time in disk hardware.
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
4 0

Answer:

a. modern disks do not disclose the physical location of logical blocks.

Explanation:

In modern disks, the disk scheduling algorithms are built in the disk drive. It is difficult for operating system to schedule for improved rotational latency. All scheduling algorithms are forced to behave the same because operating system may have constraints. Disks are usually accessed in physical blocks. Modern disks put more electronic controls on the disk.

You might be interested in
Judy is searching for files with a .jpg file extension on her laptop. Which type of file is she looking for?
nikklg [1K]
<span>JPEG files </span><span> are a common file format for digital photos and other digital graphics so she would be looking for a picture

</span>
6 0
3 years ago
Read 2 more answers
Explain briely what this statement mean.<br>"A byte is equivalent to a character"<br>​
dedylja [7]

To put it briefly, a byte is equivalent to a <em>character</em> in that it encodes a single character, being this in the form of a<u> letter, number, or symbol.</u>

A byte is the smallest unit of storage memory on any modern computer. This byte is commonly made up of<u> eight bits</u>, a combination of binary digits used to represent data. The hierarchy of computer memory is as follows:

  • 1 byte
  • 1 kilobyte
  • 1 megabyte
  • 1 gigabyte
  • 1 terabyte

The statement "<em>A byte is equivalent to a character</em>" is quite literal in its meaning given that through the use of the bits that comprise it, a byte is used to represent and store the data for a single character of text, being that a <u>letter, number or at times a symbol.</u>

<u />

To learn more:

brainly.com/question/13188094?referrer=searchResults

3 0
3 years ago
So for my Game Design class I have a quiz coming up...I was wondering if someone could answer some of these practice questions,
Over [174]
1. A script or scripting language is a computer language<span> with a series of commands within a file that is capable of being executed without being compiled.
2. Software development
3. true
4. im not sure
here is a sight that might help 
https://quizlet.com/150321269/video-game-design-terms-flash-cards/
</span>
3 0
3 years ago
Read 2 more answers
Najbardziej znane przeglądarki internetowe
grin007 [14]

What is the question?????


4 0
4 years ago
Read 2 more answers
Which tools would you use to make header 1 look like header 2.
Kamila [148]

The tools that would be used to make header 1 appear and look like header 2 is the alignment tool icon and the Bold tool icon.

To understand this question, we must understand the interface of the Microsoft Excel.

<h3>What is Microsoft Excel?</h3>

Microsoft Excel is a spreadsheet that can be used for a variety of features such as:

  • Computation of Data sets and variables
  • Calculation of Business Data
  • Arrangement and Analysis of Data into Tables etc.

As a Microsoft software, Microsoft Excel can also be used to edit sheets. In the image attached, the required tool icons needed to change the header 1 into header 2 is the alignment tool icon and the Bold tool icon.

The two tools can be seen in the image as the two lower left icons.

Learn more about Microsoft Excel here:

brainly.com/question/25863198

6 0
2 years ago
Other questions:
  • What seems to be the prevailing opinion about enterprise clouds?
    8·2 answers
  • Who are some of my emails not all deleting on my android i have to use my laptop to see them to delete them?
    12·2 answers
  • Which of the following is NOT a view which can be chosen for a presentation?
    15·1 answer
  • In a typical system design specification, the _____ section contains the complete design for a new system, including the user in
    5·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities a
    14·2 answers
  • Melinda completed the Computer Programming Aptitude Test when she applied for a position with Beta Electronics. Six months later
    14·1 answer
  • True or false: in order to keep yourself and co workers safe, you must be able to recognize electrical hazards
    8·2 answers
  • I'm pretty sure most of you know squid game, right? Well, are the actors really dying? or is it just CGI or effects? Because it'
    5·2 answers
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!