1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
11

3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s

urfaces. Each surface has 612 tracks; there are 144 sectors/track, 512 bytes/sector, and 8 sectors/cluster. The disk turns at 3600 rpm. The tract-to-track seek time is 20ms, and the average seek time is 80ms. Now assume that there is a 360KB file on the disk. On average, how long does it take to read all of the data in the file? Assume that the first track of the file is randomly placed on the disk, that the entire file lies on adjacent tracks, and that the file completely fills each track on which it is found. A seek must be performed each time the I/O head moves to a new track. Show your calculations
Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
3 0

Answer:

total time to read whole file = ( 81.380208 mili seconds ) + 80ms + 80ms

Explanation:

Size of a surface = 675/15 = 45 MB

Size of a track = (Number of sectors per track)*(Size of a sector)

= (144*512)Bytes

= 73.728 KB

Number of tracks where 360KB file is located = 360/73.728 = 4.8828125 (Approx 5 tracks)

So Seek time to go the first track of the file = 80 ms

And after seek time for track to track movement = 4*20 = 80 ms

We need 4.8828125 rotations to read whole file.

Time for 4.8828125 ratations = (60.0/3600.0)*4.8828125 seconds = 0.081380208 seconds = 81.380208 mili seconds

So total time to read whole file = ( 81.380208 mili seconds ) + 80ms + 80ms

You might be interested in
Which statement refers to a computer software
bija089 [108]

You need to see an image, but here's some possible answers.

operating system.

program.

spreadsheet.

freeware.

groupware.

shareware.

application software.

bundled software.

software system. ...

package. ...

sofware (related) ...

hardware (related) ...

software program. ...

software-hardware (related) ...

pc-based (related)

<h2><u><em>Bryannasalaz</em></u></h2>

4 0
2 years ago
A function is executed when it is
Alekssandra [29.7K]

Answer:

D. called

Explanation:

A function is executed when it is called.

Function definition comprises of the code body of the function.For example:

int add(int a, int b){

    return a+b;

}

Function declaration or function prototype specifies the signature of the function ( number and type of arguments, return type). e.g,

int add(int a,int b);

Function call is when the function is executed with actual arguments:

add(2,4);

This will return 6 upon execution of function body.

6 0
3 years ago
An alteration threat violates information integrity. <br> a. True <br> b. False
Art [367]
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




6 0
3 years ago
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
nikdorinn [45]
The answer is control
7 0
3 years ago
A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ______
jeka94

Answer:

I think is technologies

5 0
3 years ago
Other questions:
  • How to you put a color into a cell? <br> a.Shading<br><br> b.Fill<br><br> c.Color<br><br> d.Insert
    8·1 answer
  • What might the purpose be for a sata-style power connector on a motherboard?
    15·1 answer
  • The computers connected to the main server are called ______.
    14·2 answers
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • You can apply several different worksheet themes from which tab?
    10·2 answers
  • Is there a way to get back old messages that you didn't mean to delete??? I have a Samsung S5 and I really really need help. I d
    11·2 answers
  • Which guideline should you use when downloading software from the Internet?
    15·1 answer
  • Write a C program that includes a function of type double called divemaster accepts two double arguments (you must write the div
    15·1 answer
  • 1. Why do you need to take care of your computer? (Remember: Answer must include 3-5 sentences.)
    13·1 answer
  • What is the maximum number of extended partitions can you have on a hard drive?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!