1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
12

Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th

e file control block is already in memory, but no data blocks are cached): (A) 1; (B) 2; (C) 3; (D); 4.
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
7 0

Answer:

(A) 1

Explanation:

In UNIX the file system the file system is a central part of the operating system. The file system is for storage and retrieval of information. Programs that form the UNIX system also stores information in files.

UNIX file systems supports three files namely: ordinary file, directory files, device files or special files.

If we need to access bytes 2500-2503 it means the bytes are within the third block. So we will need only one access.

Note this is because the file control block (inside) is within the memory. If file control block was not in the memory we would have needed more disk accessses.

You might be interested in
Direct messages are the only private forms of communication on Twitter. True False
Sunny_sXe [5.5K]
True but ill keep typing so it meets twenty charecters                                              

7 0
3 years ago
How many assignments would you have failed without brainly?<br><br> lol.
svetoff [14.1K]
How many assignments would I have failed without brainy? Lol

ALL OF THEM
7 0
3 years ago
. What projects would Excel best be used for?
adoni [48]

Answer:

Projects that require spreadsheet organization and/or calculations between data

Explanation:

That is why Excel is a spreadsheet program

7 0
3 years ago
A palindrome is a string that reads the same both forward and backward. For example, the string "madam" is a palindrome. Write a
MatroZZZ [7]

// this function will return 1 if the string sent in arguments is palindrome //else it will return 0

int palindrome(int start_of_string, int end_of_string, string &strr)

{

// base case to check if the string is not empty

if (start_of_string>= end_of_string)

   return 1;

if (strr[start_of_string] != strr[end_of_string])

    return 0;

// recursive call

return palindrome(++start_of_string, --end_of_string, strr);    

}

8 0
4 years ago
If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
777dan777 [17]

Answer:

The WLAN would fall within the LAN Domain.

Explanation:

<em>Because, the domain that you would need to implement web content filters would be the LAN-WAN. Reason being that the LAN-WAN needs the web content filters in order to filter the data that is coming in from outside of the network and to allow good data to be able to be passed back and forth.</em>

4 0
3 years ago
Other questions:
  • Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? deskto
    13·1 answer
  • 13. Microsoft PowerPoint is the best example of Multimedia Presentation
    14·2 answers
  • 1. What is the difference between a learner’s license and an operator’s license?
    10·1 answer
  • A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
    15·2 answers
  • By applying styles,____ formats are being applied each time?
    10·1 answer
  • ?Which programmer designs programs for applications executed on the Internet?
    11·2 answers
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • If nobody buys a ticket to a movie, do they still show it?
    5·1 answer
  • Quiénes se benefician de la realidad virtual​
    12·1 answer
  • A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unautho
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!