1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
9

What is the capacity of a disk with two platters, 10,000 cylinders, an average of 400 sectors per track, and 512 bytes per secto

r?
What is the use of cache memory? Explain the concepts of cache hit and cache miss.
Computers and Technology
1 answer:
natita [175]3 years ago
3 0

Answer:

The capacity of the disk is "40 GB".

Explanation:

Given value:

\to \text{cylinder}= 10,000\\\\\to \frac{sector}{track} = 400\\\\\to \frac{bytes}{sector} = 512\\

\text{Calculating the size of track} =  \frac{bytes}{sector} \times  \frac{sector}{track}

                                            = 512 \times  400 \\\\ = 204,800 \ \ Or  \ \ 200 \ K

\text{Calculating the size of surface} = \frac{byte}{track} \times \ cylinder

                                               = 2000 \ K \times  10,000 \\\\ = 20, 000,000 \ K

\text{Calculating the capacity of a disk} = \frac{byte}{surface} \times \frac{surface}{disk}

                                                     = 20, 000,000 \ K \times  2 \\\\ = 40, 000,000 \ K \\\\= 40 \ GB

Cache memory is often used to speed up the runtime. It will enable us to improve performance unless we can store information, that is retrieved constantly in memory space.

  • Hit Cache: when the Processor relates to representing database data, Cache Hit results.
  • Miss Cache: when this Processor responds to a non-present cache data, this will trigger its miss of cache.
  • It doesn't have to retrieve the Main Memory through secondary storage.
You might be interested in
Questic
N76 [4]

Answer:

Temporary Data

Explanation:

6 0
3 years ago
What kind of memory modules include registers between the system’s memory controller and the module’s memory chips, registers th
Nookie1986 [14]

Answer: Buffered

Explanation: Buffered memory is the memory contains registers between the modules of dynamic random access memory(DRAM).It is also known as registered memory. The purpose of using buffered memory to increase the stability and decrease the electrical load.

Other options are incorrect because ECC(error correcting code)memory is for correction and detection of incorrect data, non- parity memory is that don't utilize ECC module and multi-channel used for the increment in the rate of transmission between memory controller and DRAM.

Thus,the correct option is option buffered memory because of serial communication pattern with memory controller and parallel communication technique with chips .

4 0
3 years ago
Read 2 more answers
What type would the object X be in the following statement:
Y_Kistochka [10]

Answer:

Boolean

Explanation:

If statement condition always returns true or false,which is a boolean data type.

X is true or false

it maybe a variable or an expression.

5 0
3 years ago
Read 2 more answers
If we were to replicate Dr. Stanley Milgram's obedience study today, do you think the results would be different?
Montano1993 [528]

Answer:

Explanation:

The results would be exactly the same. We have learned little about authority and when to oppose it.

I'll give you an example. Last night I was in a restaurant like Taco Bell or Subway. Across from me was a girl with an ordinary backpack which was all I could see. It was quite common to see that in the University District where I was. I paid no attention until two policemen came in (both over 200 pounds -- she was tall but could not have been more than 130) and began arrest procedures. She started shouting very foul language but otherwise did not resist. They put handcuffs on her wrists which were behind her back. Again she she  used profane language only screaming that they were hurting her. It took the one police officers a moment to find his key and loosen the cuffs, which he did, but she was still uncomfortable and cursing.  

She was silent as they took her out. Nobody questioned the incident at all. Do you think Dr. Millgram would recognize this as an example of his theory? I'm sure he would. Trust me, this was not staged. There was a 3rd officer who drove the girl and one of the 2 arresting officers away.

7 0
3 years ago
A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges fro
VikaD [51]

A solution which would best meet the CSO's requirements is: B. Sandboxing.

<h3>What is a sandbox?</h3>

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: brainly.com/question/25883753

8 0
3 years ago
Other questions:
  • What is the assignment operator?
    15·1 answer
  • Write a Java program that prompts the user to enter a sequence of non-negative numbers (0 or more), storing them in an ArrayList
    5·1 answer
  • What are the benefits of e learning​
    9·1 answer
  • _______ tools enable people to connect and exchange ideas.
    7·2 answers
  • Select the correct answer.
    6·2 answers
  • The data-mining technique that creates a report or visual representation is _____.
    13·1 answer
  • MacBook Pro (2019) at 93% max capacity battery rating after 100 charge cycles. Is this normal? Used coconut battery to check thi
    10·2 answers
  • Only need help on f and correct me if im wrong for the other questions please
    11·1 answer
  • Why can't this app have people ask riddles.
    8·1 answer
  • joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm h
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!