Calculate the blocking factor bfr

Assignment Help Basic Computer Science
Reference no: EM131053909

A file has r = 20,000 STUDENT records of fixed length. Each record has the following fields: Name (30 bytes), Ssn (9 bytes), Address (40 bytes), PHONE (10 bytes), Birth_date (8 bytes), Sex (1 byte), Major_dept_code (4 bytes), Minor_dept_code (4 bytes), Class_code (4 bytes, integer), and Degree_program (3 bytes). An additional byte is used as a deletion marker. The file is stored on the disk whose parameters are given in Exercise 17.27.

a. Calculate the record size R in bytes.

b. Calculate the blocking factor bfr and the number of file blocks b, assuming an unspanned organization.

c. Calculate the average time it takes to find a record by doing a linear search on the file if (i) the file blocks are stored contiguously, and double buffering is used; (ii) the file blocks are not stored contiguously.

d. Assume that the file is ordered by Ssn; by doing a binary search, calculate the time it takes to search for a record given its Ssn value.

Reference no: EM131053909

Questions Cloud

What is the total capacity of a track : What is the total capacity of a track, and what is its useful capacity (excluding interblock gaps)?
Product as ameasure of economic performance : What are some of the limitations using gross national product as ameasure of economic performance?
What is the flaw of argument : A common argument in favor of minimum wage laws is that they are necessary to prevent employers from taking unfair advantage of their employees. What is the flaw of this argument? Please include a example.
What is meant by more productive a resource is more demand : What is meant by "The more productive a resource is, the more it will be in demand." Can you provide an example?
Calculate the blocking factor bfr : Calculate the average time it takes to find a record by doing a linear search on the file if (i) the file blocks are stored contiguously, and double buffering is used; (ii) the file blocks are not stored contiguously.
What is the smallest number of hours : Ying threatens not to work on the project. For Ying's threat to be credible, what is the smallest number of hours that Xavier must contribute to the project? How much time does Xavier contribute? Does Ying work on the project?
Why should entrepreneurship models include ethics : Why should entrepreneurship models include ethics and social responsibility?
Human resource functions at a glance : Based upon your research, prepare a case study about the human resource functions necessary for the 2016 Olympics to be held in Rio de Janeiro, Brazil.
Embark on quantitative easing in early : For quantitative easing, why did Britain, the USA, Japan, the European Monetary Union and others embark on quantitative easing in early 2009 but not Australia?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use a for loop to iterate through the array and input values

Use a For loop to iterate through the array and input the values.

  What are the two different types of sensitivity ranges

What are the two different types of sensitivity ranges? Describe each type briefly and give a real world example for each type.

  How many pages does a process have

A machine has a 32 bit virtual address space and a 16kb page size. It has 1gb of physical memory. How many pages does a process have? How many bytes are needed for a page table, assuming 4 control bits and that disk addresses are stored elsewhere?

  Distributed computing applications

Distributed.net (www.distributed.net) is an organization that coordinates research on distributed computer applications. People and organizations can join Distributed.net and contribute idle computing power to ongoing research projects that requir..

  Signature-based intrusion detection can identify previously

The primary difference between network-based IDS and IPS is that an IPS responds to suspected attacks by blocking network traffic, while an IDS only provides notification that suspicious traffic is observed

  Analyze faster processor chip result increase in performance

Analyze the following statement: "Using the faster processor chip results in corresponding increase in performance of a computer even if main memory speed remains same."

  Hash function h is used and the signature

Suppose a hash function h is used and the signature must be valid for h(m) instead of m. Explain how  this scheme protects against existential forgery

  Views of how labor unions impact labor productivity

In your own words, describe the "traditional" and "new" views of how labor unions impact labor productivity. Be sure to describe the justification that each viewpoint uses to support their argument.

  How many strings will be read

You should read a list of strings from a data file (using scanf), and find the minimum and maxium values of the string data. The input file format will start with a single integer that indicates how many strings will be read, and then lists those ..

  Unique ids of network adapters

Network adaptors are manufactured by many companies in many countries. How can these companies ensure no two adaptors will have the same MAC address?

  Restricted domain and range for function

The function C (x) = 25x + 80,000 express the total cost C (x) (in K£) of manufacturing x units of a product. If the maximum number of units which can be produced equals 20,000, state the restricted domain and range for this function

  Comment on the situation for each of the activities

Given the following information, calculate the critical ratios and indicate which activities are on target and which need to be investigated. Comment on the situation for each of the activities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd