1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
11

3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s

urfaces. Each surface has 612 tracks; there are 144 sectors/track, 512 bytes/sector, and 8 sectors/cluster. The disk turns at 3600 rpm. The tract-to-track seek time is 20ms, and the average seek time is 80ms. Now assume that there is a 360KB file on the disk. On average, how long does it take to read all of the data in the file? Assume that the first track of the file is randomly placed on the disk, that the entire file lies on adjacent tracks, and that the file completely fills each track on which it is found. A seek must be performed each time the I/O head moves to a new track. Show your calculations
Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
3 0

Answer:

total time to read whole file = ( 81.380208 mili seconds ) + 80ms + 80ms

Explanation:

Size of a surface = 675/15 = 45 MB

Size of a track = (Number of sectors per track)*(Size of a sector)

= (144*512)Bytes

= 73.728 KB

Number of tracks where 360KB file is located = 360/73.728 = 4.8828125 (Approx 5 tracks)

So Seek time to go the first track of the file = 80 ms

And after seek time for track to track movement = 4*20 = 80 ms

We need 4.8828125 rotations to read whole file.

Time for 4.8828125 ratations = (60.0/3600.0)*4.8828125 seconds = 0.081380208 seconds = 81.380208 mili seconds

So total time to read whole file = ( 81.380208 mili seconds ) + 80ms + 80ms

You might be interested in
I damaged a k12 laptop. do I have to pay for the damage? and if so how much?
Gnesinka [82]

You explain your situation, they send you a new computer, then mail to them the broken computer and later pay a $200-350 dollar fee. I think it depends on how much damage you made to it.

5 0
3 years ago
Riodic Table
Ksenya-84 [330]

Answer:

riodic Table

A museum wants to store their valuable documents in cases that contain a gas that will protect the documents.

She should not choose one of the other gases because they are too

The museum director should choose

Explanation:

I didn't understand

8 0
3 years ago
True/False: Each individual element of an array can be accessed by the array name and an element number, called a subscript. Tru
Dahasolnce [82]

Answer:

True

Explanation:

3 0
2 years ago
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
2 years ago
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
sertanlavr [38]
B is the answer i think
6 0
3 years ago
Other questions:
  • Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
    9·1 answer
  • Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot
    11·2 answers
  • In the early part of labor, contractions come every
    6·1 answer
  • How does technology make America great?​
    10·1 answer
  • 1. in terms of technology, we often said to be living in the _____ age.???
    15·2 answers
  • 4. Select the correct answer.
    9·1 answer
  • Ano ang humahati ng globo ng equdor
    8·1 answer
  • What's the difference between joystick and mouse​
    10·2 answers
  • Explain the measures put in place in order to maintain each of the element of computer security<br>​
    10·1 answer
  • What are some of the characteristics found in an editorial photograph?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!