Number of block accesses needed to search

Assignment Help Computer Engineering
Reference no: EM133628427

Question: Consider a disk with block size B = 512 bytes. A block pointer is P = 6 bytes long, and a record pointer is PR = 7 bytes long. A file has r = 30,000 EMPLOYEE records of fixed length. Each record has the following fields: Name (30 bytes),Ssn (9 bytes), Department_code (9 bytes), Address (40 bytes), Phone (10 bytes), Birth_date (8 bytes), Sex (1 byte), Job_code (4 bytes), and Salary (4 bytes, real number). An additional byte is used as a deletion marker.

Suppose that the file is not ordered by the key field Ssn and we want to construct a B+-tree access structure (index) on Ssn. Calculate (i) the orders p and pleaf of the B+-tree; (ii) the number of leaf-level blocks needed if blocks are approximately 69% full (rounded up for convenience); (iii) the number of levels needed if internal nodes are also 69% full (rounded up for convenience); (iv) the total number of blocks required by the B+-tree; and (v) the number of block accesses needed to search for and retrieve a record from the file-given its Ssn value-using the B+-tree.

Repeat part g, but for a B-tree rather than for a B+-tree. Compare your results for the B-tree and for the B+-tree.

Reference no: EM133628427

Questions Cloud

Apply reduction division reduction division : Select all of the following that apply to mitosis. Check All That Apply reduction division reduction division duplication division produces
How was the success of the program or policy measured : How was the success of the program or policy measured? At what point in program implementation was the program or policy evaluation conducted?
What heading and section of the command output : Continuing to look at that same command's output, look for information about whether SW4 would choose to forward frames in VLAN 12 on the trunks.
Explain the strengths and weaknesses of each policy : Explain the strengths and weaknesses of each policy. Explain how the health policy you selected might impact the role of the nurse in each country.
Number of block accesses needed to search : The total number of blocks required by the B+-tree; and (v) the number of block accesses needed to search for and retrieve a record from the file-given
Which algorithm would you design to carry out : Which algorithm would you design to carry out the task most efficiently? The more efficient your solution, the better your mark
Comparison of the scope of construction vs it projects : Comparison of the scope of construction vs IT projects and the differences between Waterfall and Agile methodology in scope management
What processes of euro-american imperialism and colonialism : What are processes of Euro-American imperialism and colonialism (identify four)? How is the pursuit for knowledge become inseparable from histories of conquest?
Figure out the new maximum amount of data : increase the capacity of one connection link by k, where k is a constant. Figure out the new maximum amount of data that can be transmitted by an O(V + E) time

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program to implement a static method

A company uses public Internet to carry its phone service. The voice data will be encrypted before sending to Internet.

  What is the capacity of a particular airplane sort

You must first determine what entities want to track. Next determine what attributes are needed for each entity, and what relations exist between these entities. You should draw an E-R diagram to show these relations. Be sure to indicate all keys...

  COMP 30005 Communication Server Administration Assignment

COMP 30005 Communication Server Administration Assignment Help and Solution, Middle East College - Assessment Writing Service

  How can integrating devops practices influence

How can integrating DevOps practices influence these activities? Provide an example of where this occurred in the marketplace and what may have contributed

  Can hackers tell that you have a honeypot running

What impact would more open ports have on the ability of your honeypot to attract hackers? Can hackers tell that you have a honeypot running?

  Write the type definitions necessary

Write the type definitions necessary to contain information in a direct file. How many book records can a computer with 1,440,000 characters of file space hold?

  Write a static web page that includes the basic structure

Write a static Web page that includes the basic structure of a valid HTML (not XHTML) document. Make sure to include the language attribute of the html element.

  How can alice allocate integers to queue to optimize chances

How can Alice allocate integers to queues to optimize her chances of winning? What is her chance of winning?

  Write and test an html document that describes a list

Write and test an HTML document that describes an unordered list of at least five popular books. The bullet for each book must be a small image of book's cover.

  What weakness does the observation introduce into system

The authentication protocol described in the text allows an intruder to send arbitrarily. What weakness does this observation introduce into the system?

  Why is it so difficult to prosecute cybercriminals

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000.

  What is the pipeline clock cycle

What is the pipeline clock cycle? How long it takes to perform n operations without pipelining using the clock cycle in (a)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd