1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
4 years ago
9

Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.

Computers and Technology
1 answer:
eimsori [14]4 years ago
3 0

Answer:

SCAN disk scheduling is the algorithm in which a certain arm of disk rotates in particular direction and serves the requests that arrive from that path. It scans the cylinder's disk in both back and forth direction.

If the arm reaches the bottom of the disk , it automatically stars working in the opposite direction and serves the request in the reverse direction path.As this functioning is similar to the elevator movement ,it is also known as elevator algorithm.

You might be interested in
The Knowledge Consistency Checker (KCC) ensures the maximum number of hops between any two domain controllers does not exceed wh
Katarina [22]

Answer:

Three (3)

Explanation:

Explanation of the three basic terms here - Knowledge consistency checker, hops and domain controller - will give a clearer answer and explanation to the question as follows;

<em>Domain controller</em> : is a server controller that gives access or controls to users on computer networks by first responding to their authentication requests and verifying those users. In other words, a domain controller is a network security manager.

<em>Hop</em> : A hop is simply the passage of data packets from one network to another. As  a packet moves from its source to destination, it moves from router to router. The number of such routers that the packet passes through is called a hop.

<em>The Knowledge Consistency Checker (KCC)</em> :  It is the job of the KCC to ensure that these domain controllers participate in the replication promptly and orderly. Replication means copying data from one location to another (within a network or among networks). The KCC ensures that the maximum number of hops permitted is does not exceed 3. i.e no domain controller is more than 3 hops from any other domain controller within a network.

Note: Replication is of two types - intrasite (among all domain controllers within a site) and intersite (among all domain controllers in different sites), and the KCC can manage both type of replication. Also, by default, at every 15 minutes interval, a domain controller generates a replication topology (a logical map that dictates the domain controllers that will replicate with each other).

<em>Hope this helps!</em>

3 0
3 years ago
Emily is an aspiring lyricist. She wants to make a demo tape to send to recording companies. Which input device can she use to r
satela [25.4K]
She would use a microphone. A joystick and mouse are two answers we could eliminate immediately. Seeing as she is an aspiring lyricist means she is in the music industry, so she wold need to use a microphone to be able to record.  
6 0
4 years ago
Often, the symptoms of withdrawal are __________.
guapka [62]
I would say none of the above as A, B, and C do not seem like sensible answers.
3 0
3 years ago
What is the most important job of a web server?
attashe74 [19]

Answer:

Provide requested web pages to clients; the other tasks listed there are secondary to that.

6 0
3 years ago
Read 2 more answers
A recursive method may call other methods, including calling itself. Creating a recursive method can be accomplished in two step
liq [111]

Answer:

Explanation:

The following code is written in Java. It creates the raiseToPower method that takes in two int parameters. It then uses recursion to calculate the value of the first parameter raised to the power of the second parameter. Three test cases have been provided in the main method of the program and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println("Base 5, Exponent 3: " + raiseToPower(5,3));

       System.out.println("Base 2, Exponent 7: " + raiseToPower(2,7));

       System.out.println("Base 5, Exponent 9: " + raiseToPower(5,9));

   }

   public static int raiseToPower(int base, int exponent) {

       if (exponent == 0) {

           return 1;

       } else if (exponent == 1) {

           return base;

       } else {

           return (base * raiseToPower(base, exponent-1));

       }

   }

 

}

4 0
3 years ago
Other questions:
  • Which of these is a social consequence of effective communication
    12·1 answer
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
    13·1 answer
  • What would you use to compare two date ranges in a report?
    9·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • Which command compiles the Java source code file Welcome.java?
    11·1 answer
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • Which component of a word processor displays the name of the document?
    13·1 answer
  • One rule in the Java programming language is that you have to place a semicolon at the end of each statement. What is this rule
    10·2 answers
  • Edit the program provided so that it receives a series of numbers from the user and allows the user to press the enter key to in
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!