1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
8

A disk has 4000 cylinders, each with 8 tracks of 512 blocks. A seek takes 1 msec per cylinder moved. If no attempt is made to pu

t the blocks of a file close to each other, two blocks that are logically consecutive (i.e. follow one another in the file) will require an average seek, which takes 5 msec. If, however, the operating system makes an attempt to cluster related blocks, the mean interblock distance can be reduced to 2 cylinders and the seek time reduced to 100 microsec. How long does it take to read a 100 block file in both cases, if the rotational latency is 10 msec and the transfer time is 20 microsec per block
Computers and Technology
1 answer:
shutvik [7]3 years ago
3 0

Answer:

The answer is below

Explanation:

a)

If the blocks of a file are not put together, that is for nonadjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (average seek + rotational latency + transfer time) * 100 block

Average seek = 5 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec

t = (5 + 10 + 0.02) * 100 = 1502 msec

b)

If the blocks of a file are put together, that is for adjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (seek time * mean interblock distance + rotational latency + transfer time) * 100 block

seek time = 100 microsec = 0.1 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec, mean interblock distance = 2 cylinders

t = (0.1*2 + 10 + 0.02) * 100 = 1022 msec

You might be interested in
Joe is a florist and wants to increase his client base. How can he achieve this with the help of a computer?
madam [21]
A because sounds like the correct answer
8 0
3 years ago
Read 2 more answers
Which of these describes, in increasing order, the file sizes of the same image in different formats? Group of answer choices
Nesterboy [21]

Answer:

If left being the shortest file size and right being the biggest file size...

It is JPEG, PNG, TIFF.

Explanation:

TIFF is used primarily for editing photos or for uncompressed high quality images for things like 4K textures. The file size will be bigger since generally it is uncompressed.

PNG reserves the maximum quality of the image and can not be compressed. (It can be compressed but the results are very minimal).

JPEG allows for the user to decide the compression and quality of the image. JPEG also doesn't hold transparency data, thus making JPEG generally use less space than PNG and definitely more than TIFF.  

8 0
3 years ago
Consider the following environment with a local dns caching resolver and a set of authoritative dns name servers
Schach [20]

Answer:

Normally in a DNS server, There are no packet losses•All processing delays are 0 ms

Explanation:

If any packet lost in DNS then lost in the connection information will be displayed in prompt. Once the packet is lost then data is lost. So if the packet is lost then data communications are lost or the receiver will receive data packet in a lost manner, it is useless.

To connect in windows normally it will take 90 ms for re-establish connection it normally delays the time in windows. So that end-user he or she for best performance ping the host or gateway in dos mode so that connection or communication will not be lost. If any packet is dropped DNS will get sent the packet from sender to receiver and the ping rate will more in the network traffics.

7 0
3 years ago
_____ laws protect intellectual property.
loris [4]
Copyright laws protect intellectual property.
6 0
3 years ago
Read 2 more answers
What line has the bug?
gtnhenbr [62]

Answer:

14

Explanation:

there is never { to start the code

7 0
2 years ago
Read 2 more answers
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • ____ are types of changes that occur when text has been omitted from a document and must be inserted later.
    10·1 answer
  • Which option allows you to customize the order of your data ?
    8·2 answers
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • The following is the pseudocode for which type of algorithm? For maxElement = each subscript in the array, from the last to the
    14·1 answer
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * r^n, where n is the distance
    7·1 answer
  • Study the images of two different fronts.
    7·2 answers
  • When you use the .net data provider objects to retrieve data from a database, you can store the data in an object called a?
    8·1 answer
  • While reviewing the Quick Access toolbar, Sarah notices that the Redo button is not there. This is because the Redo button only
    12·1 answer
  • Plz help me I need help​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!