1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shtirl [24]
3 years ago
13

Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos

e the physical location of logical blocks. b. the operating systems may have other constraints such as writes may be more urgent than reads. c. rotational latency is insignificant compared to the average seek time. d. it is difficult to optimize seek time in disk hardware.
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
4 0

Answer:

a. modern disks do not disclose the physical location of logical blocks.

Explanation:

In modern disks, the disk scheduling algorithms are built in the disk drive. It is difficult for operating system to schedule for improved rotational latency. All scheduling algorithms are forced to behave the same because operating system may have constraints. Disks are usually accessed in physical blocks. Modern disks put more electronic controls on the disk.

You might be interested in
What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the
Morgarella [4.7K]

The answer is a POST Diagnostic Card.

Although not a necessity, a POST card can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the operating system. To be able to understand how a POST card works, one needs to be very familiar with the BIOS. The power-on self test (POST) is a series of various tests performed by a computer when you turn it on. If you have any issues that conflicts with the operating system and prevents the computer from booting, you can install a POST card in the available expansion slots. This card will monitor the entire boot process and report errors in coded numbers on a small LED panel on the card.  

6 0
3 years ago
Drag each tile to the correct box.
V125BC [204]

Answer:

Creates order and harmony → <em>color</em>

Creates an emotional impact → <em>texture</em>

Brings a feeling of depth to a design →<em> form</em>

Draws or minimizes attention → <em>space</em>

Divides space and redirects the eye → <em>shape</em>

Explanation:

The visual element that creates order and harmony is <em>color</em>

Color can be used to create visible patterns that can be recognized as being in harmony or disagreement

The visual element that creates emotional impact is <em>texture</em>

Texture can be used to convey either the emotions of the object or the artist

The visual element that brings a feeling of depth to a design is<em> form</em>

Form is used to present a 3-D appearance of an art, and therefore, it is used to show depth of a 2-D drawing

The visual element that draws or minimizes attention is <em>space</em>

The arrangement, location, and size of the space occupied by an object can be used to draw or minimize attention

The visual element that divides space and redirects the eye is <em>shape</em>

Shape is used to divide space into areas easily recognizable by the eye

5 0
2 years ago
What command is used to add a reflection or an outline to text
WARRIOR [948]

text effects, and typography.

6 0
3 years ago
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
3 years ago
Which of the following are logical reasons for using a pie chart to show how employees spend their time at ABC organization? Cho
MissTica

Answer:

1,2, and 4 I believe

Explanation:

I hope that helped :D

5 0
3 years ago
Other questions:
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • Illia is a network administrator at a company.which tasks is she responsible for
    9·1 answer
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • Create a function (prob3_6) that will do the following: Input a positive scalar integer x. If x is odd, multiply it by 3 and add
    15·1 answer
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • NO LINKS OR SPAMS THEY WILL BE REPORTD<br><br> Click here for 50 points
    5·2 answers
  • The post-closing trial balance shows the balances of only the ____ accounts at the end of the period.
    12·1 answer
  • Simple interest will always pay more interest than compound interest.
    14·1 answer
  • What influences my school my church and my leader on my society​
    8·1 answer
  • When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!