1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
12

In a system containing CPU 1 and Disk Drive A, the system is instructed to access Track 1, Track 9, Track 1, and then Track 9 of

Drive A. The arm is initially located at Track 1. Drive A requires 35 ms for each move. Without reordering, Drive A requires ____ to complete the access.
Computers and Technology
1 answer:
BartSMP [9]3 years ago
5 0

Answer:

Drive A requires 105 miliseconds to complete the access.

Explanation:

Hard Drives actually have physical reading and writing arms inside them which are used for reading and writing data on the drives. To perform these actions they have to move from one location to another.

The example given in the question states that the arm is moving between track 1 and track 9. With it's initial position at track 1, it makes the same movement exactly 3 times from track 1 to track 9. If it requires 35 miliseconds for this movement, then drive A should require a total time of 105 miliseconds or 0.105 seconds to complete the given task.

I hope this answer helps.

You might be interested in
Which phrase describes this image most precisely?
KIM [24]

The correct answer is D. A nice bunch of colorful flowers in a transparent water jug with a handle.

Explanation:

Describing an image precisely requires using specific details that allow others to understand or imagine the image even without seeing it. Due to this, to describe this image precisely it is a good idea to include as many accurate details as possible, which includes words such as "colorful", "flowers", "transparent", etc. In this context, the best option is D because this offers more details than other options and all of these details are accurate and specific.

4 0
3 years ago
Julie has a difficult time seeing her computer Screen and uses adaplive technology tools to help he see better. One of the tools
andreyandreev [35.5K]

Answer:

200%

Explanation:

While Julie has some difficulties reading short words, she can zoom the size of the texts by two hundred percent to make the process faster. A hundred percent or less would have much more difficulty reading short words.

4 0
3 years ago
Read 2 more answers
Last semester, Henri bought his textbooks over the Internet and saved a considerable amount of money. Classes start in a few day
castortr0y [4]

Answer:

limited problem solving

Explanation:

Henri will probably use a limited problem-solving process, we reach this conclusion due to two factors:

  1. The time he has to take the decision is short, therefore he can calmly evaluate his options
  2. His past positive experience in buying books online will influence his decision

I hope you find this information useful and interesting! Good luck!

3 0
3 years ago
Read 2 more answers
Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as we
kicyunya [14]

Answer:

i will help you waiting

Explanation:

4 0
3 years ago
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
Other questions:
  • Which best describes the difference between stocks and bonds ?
    8·2 answers
  • A multistep protocol used to identify and control potential threats to food-safety is the
    8·1 answer
  • gAssume that you are writing a program to merge two files named FallStudents and SpringStudents. Each file contains a list of st
    15·1 answer
  • What is the tallest dam in the united states of america?
    14·2 answers
  • The Painting Company has determined that for every 112 square feet of wall space:
    5·1 answer
  • How is hashing used?
    6·1 answer
  • In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu
    13·1 answer
  • What triggers a LinkedIn account ban?
    6·1 answer
  • Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This e
    13·1 answer
  • Write a for loop that displays the following numbers exactly like this (you must use a loop):
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!