What is the time to read one sector

Assignment Help Basic Computer Science
Reference no: EM132430986

Problem: We want to store 300,000 logical records, each having a size of 120 bytes, on a disk with the following size characteristics: sector size is 512 bytes/sector, each track contains 96 sectors, each surface contains 110 tracks and the disk has 8 usable surfaces in total.

Required:

Question 1: Assume that the disk rotates at 360 rpm, what is the time to read one sector?

Question 2: To read each sector from the disk, the CPU uses interrupt-driven I/O, with one interrupt per byte. If the time to process each interrupt is 2.5 μs, how much time is spent handling I/O to read one sector?

Question 3: How much time would be spent handling I/O to read one sector if DMA was used instead of interrupt-driven I/O?

Reference no: EM132430986

Questions Cloud

Critically compare four approaches to teaching science : Critically compare four approaches to teaching science, that's transmission teaching approach
Amount of information to work with : We know that encryption provides confidentiality. Does it provide privacy? (Explain)
Identify atleast two Aspen Institute panel discussion : According to the Pew report on immigration what is the relationship between our aging American workforce and immigration?Should we be concerned about this?
Characteristic of the scan disk scheduling policy : What is the main characteristic of the SCAN disk scheduling policy? Briefly describe its alternatives, C-SCAN and FSCAN and the reasons for introducing them.
What is the time to read one sector : We want to store 300,000 logical records, each having a size of 120 bytes, on a disk with the following size characteristics: sector size is 512 bytes/sector
Design an algorithm that prevents deadlock : Using either Java semaphores design an algorithm that prevents deadlock. Implement and test your algorithm by designing two threads
What differences between descriptive and evaluative research : Include a discussion of where program evaluation fits within these types of research. Then list 4 reasons for program evaluation and explain the importance.
Design a human resources system : Problem: For this Assignment, I am required to consider this scenario: I have been working with a local, medium-size business to design a human resources system
Describe the theory of knowledge called skepticism : Describe the theory of knowledge called skepticism. Consider the skeptic's charge that we can never be confident about the reliability of our normal sources.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Creative while typically acting within project constraints

work is a constant challenge as it requires them to be highly analytical and surprisingly creative while typically acting within project constraints.

  Create a two dimensional array called snowfall

Calculate and print: the average snowfall totals for each city - Calculate and print: the average snowfall totals of these five cities for each month

  Show the movement of tokens through the graph

Draw a dataflow graph to achieve a BRANCH operation using two MERGE operations and a dataflow graph to achieve a MERGE operation using two BRANCH operations.

  Determine the equivalent units of production for the month

Micro Labs uses a processing costing system. The following data are available for the mixing department for October. The department started 175,000 gallons into production during the month.

  How does the cia triad relate to access controls

How does the CIA triad relate to Access Controls? Provide an example of an access control for each of these three tenets.

  Most efficient at improving quality

In your opinion, which of the tools explored in this unit is the most efficient at improving quality? Explain why.

  Business processes as services can increase threat surface

Most of us are familiar with SaaS, PaaS, IaaS, etc. Discuss BPaaS. Consider how business processes as services can increase the threat surface.

  Result of the project execution or completion

Stakeholders include everyone who are actively involved in the project or whose interests may be affected as a result of the project execution or completion. Why should they be involved in the creation of lessons learned, at closure of a project

  Discusses decision making using system modeling

Discusses decision making using system modeling. Decide how you could use this software to create a model to help in developing a policy for a Smart City.

  Explaining why the process needs to be undertaken

Explaining why the process needs to be undertaken. Providing details regarding the information gathering process. How your employees themselves should be involved in the process, both during and AFTER the information is gathered.

  An opportunity to take advantage of economies

Most managers and executives believe their firm has an opportunity to take advantage of economies of scale; however, many firms do not. Slect one of the questions below and respond. How could you determine if your firm has economies of scale?

  Which operators are not defined for an array

There are 8 attributes for a variable: Name - a valid C/C++ identifier. No spaces, special characters (!,$,#, etc), must begin with a letter, can not be a reserved word Address - location in memory where value is stored.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd