Number of block accesses needed to search

Assignment Help Computer Engineering
Reference no: EM133628427

Question: Consider a disk with block size B = 512 bytes. A block pointer is P = 6 bytes long, and a record pointer is PR = 7 bytes long. A file has r = 30,000 EMPLOYEE records of fixed length. Each record has the following fields: Name (30 bytes),Ssn (9 bytes), Department_code (9 bytes), Address (40 bytes), Phone (10 bytes), Birth_date (8 bytes), Sex (1 byte), Job_code (4 bytes), and Salary (4 bytes, real number). An additional byte is used as a deletion marker.

Suppose that the file is not ordered by the key field Ssn and we want to construct a B+-tree access structure (index) on Ssn. Calculate (i) the orders p and pleaf of the B+-tree; (ii) the number of leaf-level blocks needed if blocks are approximately 69% full (rounded up for convenience); (iii) the number of levels needed if internal nodes are also 69% full (rounded up for convenience); (iv) the total number of blocks required by the B+-tree; and (v) the number of block accesses needed to search for and retrieve a record from the file-given its Ssn value-using the B+-tree.

Repeat part g, but for a B-tree rather than for a B+-tree. Compare your results for the B-tree and for the B+-tree.

Reference no: EM133628427

Questions Cloud

Apply reduction division reduction division : Select all of the following that apply to mitosis. Check All That Apply reduction division reduction division duplication division produces
How was the success of the program or policy measured : How was the success of the program or policy measured? At what point in program implementation was the program or policy evaluation conducted?
What heading and section of the command output : Continuing to look at that same command's output, look for information about whether SW4 would choose to forward frames in VLAN 12 on the trunks.
Explain the strengths and weaknesses of each policy : Explain the strengths and weaknesses of each policy. Explain how the health policy you selected might impact the role of the nurse in each country.
Number of block accesses needed to search : The total number of blocks required by the B+-tree; and (v) the number of block accesses needed to search for and retrieve a record from the file-given
Which algorithm would you design to carry out : Which algorithm would you design to carry out the task most efficiently? The more efficient your solution, the better your mark
Comparison of the scope of construction vs it projects : Comparison of the scope of construction vs IT projects and the differences between Waterfall and Agile methodology in scope management
What processes of euro-american imperialism and colonialism : What are processes of Euro-American imperialism and colonialism (identify four)? How is the pursuit for knowledge become inseparable from histories of conquest?
Figure out the new maximum amount of data : increase the capacity of one connection link by k, where k is a constant. Figure out the new maximum amount of data that can be transmitted by an O(V + E) time

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd