1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
6

A disk rotates at a rate of 7200 revolutions per minute. Seek operations (i.e., moving the access head to a desired track) take

on average 20 milli-seconds. Once the access head is on the appropriate track, it takes an average of one half revolution of the disk to get to the beginning of a requested sector. Each track contains 128 sectors and each sector contains 512 bytes of data. How long on average does it take to get the access head to the beginning of a randomly selected sector on a randomly selected track? Express your answer in micro-seconds (not seconds or milli-seconds).
Computers and Technology
1 answer:
Leno4ka [110]3 years ago
8 0

Answer:

24.167 micro seconds.

Explanation:

The given rotation rate = 7200 rpm = 7200 rounds per minute

Rotational latency is the average time taken for the head to reach starting of sector .

Rotational latency (in micro seconds) = (1 / (RPM / 60)) * 0.5 * 1000

(1/(7200/60))* 0.5 * 1000 = 4.167 ms

Thus, rotational latency = 4.167 ms.

Seek time = 20 ms

The average time taken for the access head to get to the beginning of randomly selected sector will be equal to the average time to first reach the random track plus the average time taken to reach random sector .

= 20 ms + 4.167  ms  = 24.167 micro seconds.

Thus, it would take 24.167 micro seconds to get the access head to the beginning of a randomly selected sector on a randomly selected track.

You might be interested in
Which of the following statements is CORRECT? a. Multiple IRRs can occur only if the signs of the cash flows change more than on
BigorU [14]

Answer: i think the answer is

a. Multiple IRRs can occur only if the signs of the cash flows change more than once.

Explanation:

3 0
3 years ago
A bulb has a resistance of 15Ω and is rated at 3A. What is the maximum voltage that can be applied across the bulb?
Anastasy [175]

Answer:Wheres the option choice??????????????????????

Explanation:

7 0
2 years ago
Rectangle perimeter is 72 .Find the new perimeter if length is doubled and breadth is tripled​
777dan777 [17]

Answer:

Is it related to technology and computers?

3 0
3 years ago
If you’d like to have multiple italicized words in your document, how would you change the font of each of these words
Alex787 [66]

Answer:

Use styles and modify the font of the default style

Explanation:

4 0
2 years ago
The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured
natka813 [3]

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

4 0
3 years ago
Other questions:
  • What is computing networking​
    5·1 answer
  • What determines the keystroke to open a cmos editor? how can you find this information?
    15·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    6·1 answer
  • how can you create fades with the smart tool? How can you specify the types of fade curves that are used with the smart tool?
    13·1 answer
  • Which of these reduces friction and makes the job of moving a freezer easier?
    10·1 answer
  • What target audience does your product serve?
    13·1 answer
  • The Python print function
    9·1 answer
  • Instead of sending an entire file in one big chunk across the​ Internet, __________ is used which dices the file up into little
    12·1 answer
  • What are 3 software programs for mobile computing?
    10·1 answer
  • Class 10 computer unit 1 all excersise​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!