Estimate the average percentage of the total time

Assignment Help Basic Computer Science
Reference no: EM131210296

Consider a long sequence of accesses to a disk with 8 ms average seek time, 3 ms average rotational delay, and a data transfer rate of 60 Mbytes/sec. The average size of a block being accessed is 64 Kbytes. Assume that each data block is stored in contiguous sectors.

(a) Assuming that the blocks are randomly located on the disk, estimate the average percentage of the total time occupied by seek operations and rotational delays.

(b) Suppose that 20 blocks are transferred in sequence from adjacent cylinders, reducing seek time to 1 ms. The blocks are randomly located on these cylinders. What is the total transfer time?

Reference no: EM131210296

Questions Cloud

Demand for dollars in international financial markets : Why has the demand for dollars in international financial markets continued to grow, even though the dollar is no longer the official reserve currency?
Identify at least one major stressor in your life : Identify at least one major stressor in your life and discuss its likely impact on your health and steps you could take to mitigate that impact. Provide specific examples to support your response.
What is the maximum number of bytes : A disk unit has 24 recording surfaces. It has a total of 14,000 cylinders. There is an average of 400 sectors per track. Each sector contains 512 bytes of data.
What attitude will you convey through illustration : What attitude will you convey through illustration? Will you portray yourself as serious, intellectual, passionate, desensitized, or sarcastic? Think about your stance and convey your stance throughout your essay.
Estimate the average percentage of the total time : Consider a long sequence of accesses to a disk with 8 ms average seek time, 3 ms average rotational delay, and a data transfer rate of 60 Mbytes/sec. The average size of a block being accessed is 64 Kbytes. Assume that each data block is stored in..
What options could the imf recommend to correct : Leticia is a small country that is experiencing a deficit in its balance of payments.- What options could the IMF recommend to correct the imbalance in Leticia's balance of payments?
How long can a deficit in the balance of payments persist : Under flexible exchange rates, what happens if a country experiences a deficit in its balance of payments?- How long can a deficit in the balance of payments persist?
Assuming you cannot hire entirely ethical employees : Assuming you cannot hire entirely ethical employees, discuss your opinion of trying to teach employees to act more ethically than they might be inclined. Discuss how you would accomplish this.
Is a superstar enterprise systems executive enough : CIS 545: Enterprise Systems. Is a "superstar" enterprise systems executive enough to lead an initiative to overcome many of the other challenges discussed in this week's material? Why or why not

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determining the array of integers

Write a method, insertAt, that takes four parameters: an array of integers; the length of the array; an integer, say, insertItem; and an integer, say, index. The method inserts insertItem in the array at the position specified by index.

  Find out product stream temperature and volume

Find out the product stream temperature and volume required to carry out reaction in a CSTR at 50 % conversion in adiabatic mode of operation.

  Subsets of cardinality

Prove by induction that for every n >= 3, any set of cardinality n has exactly n(n-1)(n-2)/6 subsets of cardinality

  Important aspect of information systems security

Identity and access management is an important aspect of information systems security. One of its crucial functions is to help determine who should get access to the system and who should not.

  Conductivity of intrinsic semiconductors

Briefly describe the effect of temperature on the conductivity of intrinsic semiconductors.

  It support of strategic planning

Write a research paper on IT support of strategic planning. Your paper should be in APA style and should not be less than 1000 words

  Communications with the host

How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host?

  Who should be involved in environment and network design

Who should be involved in environment and network design?

  Assignment regarding the public key infrastructure

You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators.

  What one characteristic about standard normal distribution

What one characteristic about the Standard Normal Distribution make it different from any normal distribution?

  Write a program that instantiates objects of your classes

Write a program that instantiates objects of your classes and outputs each object's area (except Quadrilateral).

  The text files boynames.txt

The text files boynames.txt and girlnames.txt contain a list of the 1,000 most popular boy and girl names in the U.S. for the year 2003 as compiled by the Social Security Administration.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd