1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
4 years ago
14

Suppose a file system can have three disk allocation strategies, contiguous, linked, and indexed. We have just read the informat

ion for a file from its parent directory. For contiguous and linked allocation, this gives the address of the first block, and for indexed allocation this gives the address of the index block. Now we want to read the 10th data block into the memory. How many disk blocks (N) do we have to read for each of the allocation strategies?
Computers and Technology
1 answer:
otez555 [7]4 years ago
6 0

Answer:

Since we are using three disk allocation strategies,continuous linked and indexed,therof to process and read allocation strategies we need 99830 disk blocks.

You might be interested in
In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the l
Shtirlitz [24]

Answer:

best-fit

Explanation:

Best-fit: Closest in size to the request: In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that is large enough to satisfy the request

3 0
4 years ago
You can use the ____ command to delete an entire table and its data.?
jek_recluse [69]
You can press control and x at the same time, the delete button, or backspace
6 0
4 years ago
MARK YOU THE BRAINLIEST!
AVprozaik [17]

1.) Over 3,000 corporations, charity groups, and government agencies reported data breaches. The majority of the accounts were exposed due to deliberate hacking, which accounted for 40% of the 5,000 occurrences.

2.) It drops By 20% within the 4 years. It goes at a steady pace then drops.

3.) It's a lot simpler. Everything, including databases, is now connected to the internet. This makes it much easier for anyone with the right skill set to access this data from anywhere in the world, with very little equipment or personnel, which is why data breaches caused by hackers are far more common than other types of incidents that would necessitate a lot more resources to access the same data.

4.) Another day, hackers claim responsibility for yet another big data leak. A hacker organization known as ShinyHunters said that it was auctioning 70 million sets of sensitive data reportedly obtained from AT&T only days after a breach at T-Mobile exposed roughly 53 million people's personal information. They are also interested in credit cards. If this trend continues, our social security and life will be jeopardized.

5.)Financial and payment systems have evolved over thousands of years, despite the fact that they are typically regarded of as new phenomenon. Over that time, the way transactions are carried out has changed dramatically, but the core goals have not. For instance, the economic tasks performed by Renaissance Italy's first modern banks are still relevant today.

Hope this helps took a while lol :)

4 0
2 years ago
1. Search Engines are able to search ________ type of information.
defon

Answer:

search engines are able to search Boolean type of information.

6 0
3 years ago
Read 2 more answers
True or False? Inserting special characters in a document can be completed using the Ribbon or a keyboard shortcut.
lina2011 [118]
True. hope this helps!
5 0
3 years ago
Other questions:
  • Why wont my brainly account rank up even tho i have 1193 points and 5/5 brainly trophies but it still wont rank me up to vistro
    11·2 answers
  • ​ A wire service is also known as a ____.
    7·1 answer
  • Prove that any amount of postage greater than or equal to 64 cents can be obtained using only 5-cent and 17-cent stamps?
    15·1 answer
  • How do you leave a conversation or group text on iphone (ios 10)? Help!!
    5·1 answer
  • If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80
    9·2 answers
  • 12. ______ is considered to be the first video game mascot.
    7·1 answer
  • When in global configuration mode, which steps are necessary to edit an ip address on an Ethernet interface?
    11·1 answer
  • Which of these is a Microsoft certification for system engineers
    7·1 answer
  • Assume the user responds with a 3 for the first number and a 5 for the second number.
    13·1 answer
  • a client device on your network is trying to authenticate via radius proxy, but is failing. you check the relevant policy on the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!