1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
7

. Suppose an instruction takes 1/2 microsecond to execute (on the average), and a page fault takes 250 microseconds of processor

time to handle plus 10 milliseconds of disk time to read in the page. (a) How many pages a second can the disk transfer? (b) Suppose that 1/3 of the pages are dirty. It takes two page transfers to replace a dirty page. Compute the average number of instructions between page fault that would cause the system to saturate the disk with page traffic, that is, for the disk to be busy all the time doing page transfers.
Computers and Technology
1 answer:
saul85 [17]3 years ago
8 0

Answer:

a. 100.

b. 31500.

Explanation:

So, we are given the following data which is going to help in solving this particular question.

The time required to execute (on the average) = 1/2 microsecond , a page fault takes of processor time to handle = 250 microseconds and the disk time to read in the page = 10 milliseconds.

Thus, the time taken by the processor to handle the page fault = 250 microseconds / 1000 = 0.25 milliseconds.

The execution time = [ 1/2 microseconds ]/ 1000 = 0.0005 milliseconds.

The number of Pages sent in a second by the disc = 1000/10 milliseconds = 100.

Assuming U = 1.

Hence, the disc transfer time = [2/3 × 1 } + [ 1/3 × 0.25 milliseconds + 15 ] × 2.

=0.667 + 15.083.

= 15.75 millisecond.

Average number of instruction = 15.75/0.0005 = 31500.

You might be interested in
Approximately, what percentage of Smartphone owners in America uses their mobile devices to access social media platforms?
Dmitry_Shevchenko [17]
Yes you are correct it is 40%
5 0
3 years ago
Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
dlinn [17]

Answer:

A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area.

the use of buried sensor for perimeter intrusion detection system, becomes very popular due to the advantage of been a discreet or even an invisible detection system and avoiding the need to build an above-the-ground fence to protect the perimeter due to costs or environmental reasons

Explanation:

<em>Description of 3 systems:</em>

Barrier-Mounted :Fence Intrusion Detection System

PIDS deployed on or in conjunction with a fence or other physical barrier (e.g. DAS cable or other motion sensors mounted on a fence).

Ground-based or Below-ground :

PIDS deployed below ground (again a DAS cable can be used or pressure sensitive cable or electromagnetic field). These do not require a physical barrier.

Free-Standing

PIDS deployed above ground that do not need to be installed on or in conjunction with a physical barrier (e.g. bistatic microwave link).

Example of one PIDS system I have seen deployed in a familiar location is the ones at the prison which is a barrier mounted or some inairports that prevent small to cause harm to small animals.

4 0
3 years ago
A ____ document identifies the purpose of the program being developed, the application title, the procedures to be followed when
telo118 [61]

Answer:

requirements

Explanation:

<h2><u>Fill in the blanks</u> </h2>

A <u>requirements</u> document identifies the purpose of the program being developed, the application title, the procedures to be followed when using the program, any equations and calculations required, any conditions within the program that must be tested, and any notes and restrictions that must be followed by the program.

7 0
3 years ago
Can someone please help me with this question?
madreJ [45]
I would use a biometric machine that scans a fingerprint and a eye retina then calls up my bank information from the scan. Who wants to carry a card around anyway?
5 0
3 years ago
Please answer my question y'all!
katrin [286]

Answer:

Explanation:1000 mp3s

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is special about the f and j keys on a standard keyboard?
    15·2 answers
  • What is the day adopt me launched its game on roblox?​
    14·2 answers
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels.â
    6·1 answer
  • Which statement best represents the denotation for the word “woman”? A woman is an adult human female. Both man and woman are re
    11·2 answers
  • Post as a reply your example of "data, which is processed into information" case - examples should not necessarily be related to
    13·1 answer
  • Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for th
    13·1 answer
  • Why is simplicity important in navigation design?
    13·1 answer
  • What helps you evaluate websites for reliable information?
    15·2 answers
  • Write an application that inputs a five digit integer (The number must be entered only as ONE input) and separates the number in
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!