Compute time to read whole disk if read head is-first sector

Assignment Help Operating System
Reference no: EM1382020

Assume the hard disk above has 1024 cylinders, 6 tracks per cylinder, 32 sectors per track and 1KB per sector. Maximum seek time is 450 msec, time to move between adjacent cylinders is 10 msec, rotation time is 12 msec and switching between adjacent tracks in cylinder takes 1 msec.

a) If entire disk was full of data stored consecutively, how much time would it take to read whole disk if read/write head is already positioned on first sector of first track of first cylinder of the disk?

b) Determine maximum access time (worst case) for 800KB of data not stored on consecutive tracks. Clearly describe your solution/working.

Reference no: EM1382020

Questions Cloud

Search the internet about the enron scandal : Search the Internet about the enron scandal , read and understand the story about the scandal , then after reading you will submit a reaction paper
Clarification of globalization : Illustrate out the term globalization. What effect does globalization have on popular culture? Provide an example of how American popular culture has influenced other countries
Kohlberg theory of moral development : Write down 400 words about Kohlberg's theory of Moral Development. How does this theory inform our understanding of plagiarism,
Response about plato republic : This has to be at least a 1500 character response about Plato's Republic. My teacher is using TurnItIn. I need to know what is meant in the book when justice is defined as doing good to friends and bad to enemies.
Compute time to read whole disk if read head is-first sector : If entire disk was full of data stored consecutively, how much time would it take to read whole disk if read/write head is already positioned on first sector of first track of first cylinder of the disk?
Human services ethical standards : Please help me answer this question adolescent brain in Feldman, describe how you can aid teenagers and adults get through these adolescent years without the risk of long term affects of poor choices. It need to be 400 words.
How can i prevent unauthorized access to customer data : How can I prevent unauthorized access to my customer database or website? What should I do to assure my customers that my eCommerce site is safe to do business with?
Program a maze-type game using assembly language : This project requires you to program a maze-type game using Assembly Language. It is not acceptable to use any other programming language for this project. T
Kohlbergs moral reasoning : What moral compass do you use: Kohlbergs Moral Reasoning, a professional Code of Ethics, or Gods word? What is your trump card?

Reviews

Write a Review

Operating System Questions & Answers

  Question about throughput and capacity

Throughput and capacity are determining factors for effectiveness of a system more so than processor speed?

  Analyse the different methods for collecting data

Analyse the different methods for collecting data Explain by taking examples 3 types of Sampling techniques.

  Question about network design

Sterling Corporation wishes you to create a network infrastructure for them. They have 5-divisions with many hundred users at each division across the US.

  C language program to remove vowels from text

Create a function isvowel() that test whether or not character is a vowel. Use function in a program that reads standard input document and writes to the standard output document,

  Explaining the type of firewall

Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?

  Deadlock avoidance and scheduling

Deadlock Avoidance and Scheduling

  Multicast service model in the internet

Those applications that do not need a high level of reliability for operations can use the Minimalist Internet Multicast service model, like streaming of continues information in the forms of audio or video

  Asymmetric encryption algorithm

Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Wireless encryption standards

Compare the several wireless encryption standards. Determine the purpose of implementing wireless encryption and discuss the benefits of each standard?

  Testing a motherboard

Assume you wish to test a motherboard used in an installation before you proceed too far into the installation. From the devices listed below, choose the minimum devices

  Identifying wireless network architectures

Some of the local hospital's administrators are questioning privacy of patients' data with wireless transmission. Discuss and determine the merits of their concerns.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd