1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
11

3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s

urfaces. Each surface has 612 tracks; there are 144 sectors/track, 512 bytes/sector, and 8 sectors/cluster. The disk turns at 3600 rpm. The tract-to-track seek time is 20ms, and the average seek time is 80ms. Now assume that there is a 360KB file on the disk. On average, how long does it take to read all of the data in the file? Assume that the first track of the file is randomly placed on the disk, that the entire file lies on adjacent tracks, and that the file completely fills each track on which it is found. A seek must be performed each time the I/O head moves to a new track. Show your calculations
Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
3 0

Answer:

total time to read whole file = ( 81.380208 mili seconds ) + 80ms + 80ms

Explanation:

Size of a surface = 675/15 = 45 MB

Size of a track = (Number of sectors per track)*(Size of a sector)

= (144*512)Bytes

= 73.728 KB

Number of tracks where 360KB file is located = 360/73.728 = 4.8828125 (Approx 5 tracks)

So Seek time to go the first track of the file = 80 ms

And after seek time for track to track movement = 4*20 = 80 ms

We need 4.8828125 rotations to read whole file.

Time for 4.8828125 ratations = (60.0/3600.0)*4.8828125 seconds = 0.081380208 seconds = 81.380208 mili seconds

So total time to read whole file = ( 81.380208 mili seconds ) + 80ms + 80ms

You might be interested in
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
hoa [83]

Answer: Federation

Explanation:

In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.

3 0
3 years ago
Small-business owner Marcos set up his Google Ads campaign by thinking of “obvious” keywords off of the top of his head. What's
LiRa [457]

Answer:See the suggestions on the Opportunities tab

Explanation: The improvement in the Google ad can be made by the taking a look at the Opportunities tab which will display the adequate opportunities.

The tab displays these opportunities on the basis of the campaign settings, account's history, performance, style, trends etc and thus will create the appropriate opportunities accordingly.Thus Marcos will have to see the suggestion displayed on Opportunities tab

5 0
3 years ago
Write. true or false​
ella [17]
Um I need a image or smth
8 0
3 years ago
Read 2 more answers
What is a digital pen called<br><br>A digital pen is called a ____
steposvetlana [31]
A digital pen is a battery-operated writing instrument that allows the user to digitally capture a handwritten note or drawing. Typically, a digital pen comes with a Universal Serial Bus (USB) cradle to let the user upload the handwritten notes to a personal computer (PC).

Sometimes called a smart pen or stylus.
4 0
3 years ago
Read 2 more answers
In order to protect your computer from the newest virus, which of the following should you do after you've installed a virus sca
grigory [225]
After the viruses would be detected we have to clean them.
means we have to erase the virus . 
6 0
3 years ago
Other questions:
  • Producers must understand the marginal benefit of making an additional unit which shows the ...
    5·2 answers
  • How to upgrade from office home to office professional
    13·1 answer
  • A USB zipper drive is a small data storage device that plugs into a computer's USB port.
    14·1 answer
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • Write a program that will input the names, ages and weights of three siblings and display the lightest followed by the youngest
    13·1 answer
  • What are TWO examples of soft skills?
    11·1 answer
  • Why do you think Jacinda believed what people told her about her own beauty? Even if you understand that what you see on social
    13·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • Assessment
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!