A magnetic disk has an average seek time of 8 ms. The transferrate is 50 MB/sec. The

disk rotates at 10,000 rpm and the controller overhead is 0.3msec. Find the average time to read or write 1024 bytes.

Answers

Answer 1

Answer:

11.32milisec.

Explanation:

Average seek time = 8ms

transfer rate = 50MB/sec

disk rotate = 10000 rpm

controller overhead = 0.3 msec

Average time = ?

Average time is the addition of the seek time, transfer time, rotation time and ontroller overhead

[tex]Average\,time = Seek\,time+Rotation\,time+Transfer\,time+Controller\,overhead[/tex]

now, find the rotation time,

Rotation time is the time at which half rotation is made.

[tex]Rotation\,time=\frac{0.5}{rotation\,per\,second}[/tex]

convert rotation per minute to rotation per second.

[tex]rps=\frac{10000}{60}[/tex]

substitute in the above formula.

[tex]Rotation\,time=\frac{0.5}{\frac{10000}{60} }=0.003sec[/tex]

or 3milisec

now, find the transfer time by formula:

[tex]Transfer\,time=\frac{Number\,of \,read\,or\,write\,bytes}{transfer\,rate}[/tex]

so, read or write bytes is 1024

[tex][tex]Transfer\,time=\frac{1024}{50*10^{6} }=0.02milisec[/tex][/tex]

The average time is:

[tex][tex]Average\,time= 8+3+0.02+0.3=11.32milisec[/tex][/tex]


Related Questions

You use ____ operators to perform calculations with values in your programs.

a.
arithmetic

b.
calculation

c.
integer

d.
precedence

Answers

Answer:

arithmetic

Explanation:

Arithmetic operator like + , - , * , / are used to perform calculations with values in programs. For example:

1 + 2 will add 1 and 2 and return the value 3.

1 * 2 will multiply 1 and 2 and return the value 2.

3 - 2 will subtract 2 from 3 and return the value 1.

The values which undergo the operation can be integral or floating point.

Answer:

Option a is the correct answer for the above question.

Explanation:

For any programming language, An arithmetic operator is used to perform the calculation for any set of values. It takes two or more value to perform the calculation. This operation performed by the help of the Arithmetic logic unit which is also called ALU. It lies on the CPU and works for the instruction of the control unit.

The above question scenario states that if there are two or more value then which operator is used to perform calculation then the answer is an arithmetic operator as described above. Hence option a is the right answer. while the other is not because--

Option b states about calculation operator but it is not the defined operator for any programming language. Option c states about integer operator but it is not the defined operator for any programming language. Option d states about precedence operator but it is not the defined operator for any programming language. It tells that which operator is executed first if two or more operators are used for any statement.

Describe FIVE significant advantages of web-based applications for an organisation.

Answers

Answer

There are a lot of advantages of web based applications.

Explanation:

Below are the advantages:

Web based applications can be accessed from device that is connected to the device. No physical software required to download, install, update or manage which saves a lot of administration work for large companies. Web based software is compatible with any device or platform. The software is delivered through a browser of the users' choice.Mobile device applications allow for access to the software when out of the office. Direct access to latest information for Employees where every they are located.

Apart from these, there are lot more benefits, like quick and easy updates, centralized data where data is secure and easy to backup.  We can reach anybody, anywhere in the world.

Business costs are drastically reduced by spending less time talking to customers over the phone.

Online training can be finished at user's own time and risk.

It's available 24 hours a day, 7 days a week

The software is always up-to-date

What is Belady in computer language ?

Answers

Answer: Belady’s anomaly is a process in which by increase in the number of page frames there is a increase in the number of page faults for memory access pattern.

Explanation: Belady's anomaly was if there is a increment in the number of page frames then it will result in the increment of page faults as well in computer terms. The process was seen usually on the following replacement algorithm:-

FIFO(first-in first-out) Random page replacement

Which of the following expression is equivalent to (x >1)?

x >= 1

!(x <= 1)

!(x = 1)

!(x < 1)

None of the above
Please explain so that I can learn from you.

Answers

Answer:

!(x <= 1)

Explanation:

The operator '!' comes in the logical operator category and it names is not Operator.

It used with the Boolean value if the Boolean value is TRUE then NOT operator gives output FALSE.

if the Boolean value is FALSE then NOT operator gives output TRUE.

so, consider the expression (x >1).

It means x is greater than 1.

Now, think about when the condition will be false.  

So, the condition will be If x is less than or equal to 1.

the option 1 is x >= 1. So, it greater than equal to 1.  This is not the correct option

!(x <= 1) it means x is less than equal to 1 and include the NOT operator then it becomes X is greater than 1 (x > 1). So, This is the one possible answer.

!(x = 1): it means x can be greater than or less than 1. so, this is not correct.

!(x < 1): it means x can be greater than or equal to 1. This is also not correct because it includes the equal part as well.

What are the most common MIS (management information systems) used in a business place.

Answers

Answer:

  MIS (management information systems) is a computer system consist of hardware and a software that together serves as the backbone of operations for an organisation. It is an important tool for any business irrespective of its scale of operation and its size and frequency and usage may be vary with business. As, MIS tools help in move data and manage the information.

The technologies and tools are used in MIS have evolved over the time such as minicomputers, mainframe and server networks.

Explain Software licensing

Answers

Answer:

Software Licensing is pretty much allowing another company to use your own product.

Explanation:

For Example:

Company A is working on a face swap application which requires a facial recognition software in order to work. They can either build one from scratch (which can take months) or they can pay someone who already has one in order to be able to use it.

Company B owns a facial recognition software and are asked by Company A to license their software to them. Company A pays Company B, they then draft up a contract for Company A allowing them to use the facial recognition app.

Software licenses are either proprietary, free, or open source. Proprietary is the one used in the example above.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Final answer:

Software licensing is the legal instrument defining how software can be used and distributed. Proprietary software typically restricts access to source code, whereas open source licenses, such as GPL and BSD, facilitate sharing and collaboration, even allowing users to modify and redistribute software under certain conditions.

Explanation:

Software licensing refers to the legal framework through which end users are allowed to use and distribute software. Modern software is developed in a human-readable format known as source code and then compiled into machine-readable software. However, converting compiled software back into original source code is not as straightforward. This is why terms set out in software licenses, like the GNU Public License (GPL) or the Berkeley Software Distribution (BSD) license, are crucial for defining how software can be shared and used.

The GNU project's GPL stipulates that anyone can use, modify, and distribute software, so long as the modified source code is also made available under the same GPL terms. This concept is at the core of the 'open source' ethos and encourages the growth and evolution of the software community. In comparison, traditional proprietary software models, like those commonly seen with Windows executables, restrict access to the source code, limiting customization and redistribution.

Many modern software projects, including the Python and R projects, operate under open source licenses, fostering collaboration and innovation. Similarly, Creative Commons licenses permit the use, sharing, and remixing of creative works while maintaining the legal framework to protect such commons.

It is important to note that open source software might not always be free; users can modify and distribute the software, but there can be restrictions on the commercialization of those modified versions.

Is software piracy really a threatfor IT industry ?

Answers

Answer: yes,software piracy is a threat for the IT industry.

Explanation: Software piracy is the illegal act of copying,stealing and using of the software and leads to the legal consequences too. This creates severe damage for the software and IT industry because they face a huge loss period and thus they do not gain the expected profit. Piracy of software is also harmful towards the user as well because their stored data is not safe and risky. Therefore, software piracy is a threat for the IT industry.

1. What is theoutput of the following code fragment if the input values are 1 and2?
int x;
int y;
cin>>x;
cin>>y;
cout< cout< A. 1
2
B. 1 2
C. 12
D. xy

Answers

Answer:

Hi,  in the last one a correct way of the code will be:

cout<<x<<y;

or

cout<<x;

cout<<y;

In the first case you get 12, the C.

In the second case you also get the C.

Explanation:

If you want to make a jump line you have to use endl

e.g.

cout<<x<<endl;

cout<<y<<endl;

And after this you get:

1

2

In the other ways, you get the previously result in the output.

I hope it's help you.

The ___ of a signal is the range of frequencies that it contains.

a) spectrum b) effective bandwidth c) wavelenghth d) absolute bandwidth

Answers

the answer is A. Spectrum

A void function can return any value. TRUE FALSE

Answers

Answer:

False

Explanation:

False

A void function does not return anything

Final answer:

A void function cannot return any value, and the claim that it can is false. It performs operations without returning a value. In some languages like Python, a void function implicitly returns 'None', indicating the absence of a value.

Explanation:

The statement that a void function can return any value is FALSE. A void function is a type of function that does not return any value. The keyword void indicates that the function is expected to perform an action without the need to return a value. When a void function is executed, it might perform operations such as displaying content on the screen or modifying a global state, but it cannot return a value to the caller.

Although a void function does not return a value itself, in languages like Python, it may implicitly return a special value called None, which is treated as the absence of a value. This should not be confused with functions that return other types of values, such as Booleans, Integers, Floating point numbers, Strings, Arrays, Objects, or Resources.

What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?

Answers

Answer and Explanation:

E-commerce and e-business is a major business of the present time using the internet. It is basically defined as the online selling of goods or making any business online. Internet is the basic requirement for the e-commerce or e-business as

it helps in providing the internet connectivity so that the e-business can be displayed online and users can buy goods or interact with seller regarding the business. Due to internet service users get to know about the online business and thus the business attains economic growth and benefit.

. To allow access to network resources is the function of______________________

a. Application layer

b. Physical layer

c. Network layer

d. logical link layer

Answers

I think Network layer is the answer.

With few exceptions, ________ are warm-blooded, havelive births, and are suckled with milk from their mother’sbody.
which mammals
mammals
mammals that
mammals, they

Answers

Answer:

mammals

Explanation:

With few exceptions, mammals are warm-blooded, have live births, and are suckled with milk from their mother’s body.

Answer:

Just mammals. Hope that helps.

Explanation:

Which one of the following media is most resistant to EMI?

a. coaxial cable

b. UTP cable

c. STP cable

d. fiber-optic cable

e. microwaves

Answers

Answer:

D - Fiber-optic Cables

Explanation:

Electromagnetic interference affects cables made from different metals and can corrupt the data running through them. However, Fiber-optic cables are constructed from glass (non-metallic) and transmit pulses of light as signals to transfer data, this means that the cables are most resistant and not susceptible to EMI.

Queue is the LIFO structure.

o True

o False

Answers

Answer:

The answer is False.

Explanation:

By definition LIFO structure is defined by: Last In, First Out.

By definition FIFO structure is defined by: First In, First Out.

A queue has the basics operations push() and pop() where:

push(element) stores the element at the end of the queue.element = pop() retrieves the element at the beginning of the queue.

For example:

If you insert the elements doing the push(e) and q.pop(e) operation:

Queue q;

Element e;

q.push(2); // q ={2};

q.push(5); // q ={2 , 5};

q.push(6); // q = {2, 5, 6};

q.pop(e); //  q ={5, 6}; e = 2;

q.push(12); q ={5, 6, 12};

q.pop(e); //  q ={6, 12}; e = 5;

Note: A stack is a LIFO structure.

The signal(s)that control the direction that data is transferred on its buslines is the _________ signal(s).

Answers

Answer:

They are called control signals

T F Overuse of global variables can lead to problems.

Answers

Answer:

True

Explanation:

Global Variables

Variables which are declared outside any function. Any function can use these variables,they are automatically initialized to zero(0).They are generally declared before main() function.

Problems

We can modify the global variable in any function as any function can access it. So it is hard to figure out which functions read and write these variables. Various problems are-

No Access Control Concurrency issuesMemory allocation issues

Every call to a recursive function has its own code and its own set of ____ and local variables

A.
headers

B.
parameters

C.
stack

Answers

Answer: Parameters

Explanation:

Whenever a call to a recursive function is made, then the function has its own code and its own set of parameters with local variables. These parameters are within the scope of the recursive function. For example while finding the factorial of a number we are given the function with parameter such as int recursive(int n) where int n is a parameter passed into the function.

A computer on a company network was infected with a zero-day exploit after an employee accidently opened an email that contained malicious content. The employee recognized the email as malicious and was attempting to delete it, but accidently opened it. Which of the following should be done to prevent this scenario from occurring again in the future? A. Install host-based firewalls on all computers that have an email client installed B. Set the email program default to open messages in plain text C. Install end-point protection on all computers that access web email D. Create new email spam filters to delete all messages from that sender

Answers

Answer:

A. Install host-based firewalls on all computers that have an email client installed

Explanation:

Since the employee accidentally opened the email that contained malicious content and the computer on the company network got infected, it needs to install host-based firewalls on all computers that have an email client installed on the system. A host-based firewall is a type of firewall installed on individual client or server which controls the incoming and outgoing networking data and identifies whether to allow it or not. The host-based firewall can easily identify and block suspected exploits like viruses, worms or trojan horses.

By installing host-based firewalls on all computers that have an email client installed secures the entire network of computers.

Answer:

The answer is C.

Explanation:

To prevent such thing from happening in the future, the employee/company should Install end-point protection on all computers that access web email

What is the value of x after the following statements execute? int x, y, z; y 12; z 3; X= (y*(z+y-10); A. 36 B. 144 C.60 D. None of these

Answers

Answer:

60

Explanation:

According to the operator precedence, the bracket comes in the top. So, the program solve expression in the bracket first.

In the code, the value of Y is 12  and z is 3

substitute the value in the formula.

X = (12*(3 + 12 - 10)).

So, the program calculate the value (3 + 12 - 10) first which gives 5.

After that program evaluate (12 * 5) which gives 60.

Therefore, the answer is 60.

Write a C++ program which finds the reverse of a number.

Answers

Answer:

C++ Program to reverse number

#include <iostream>

using namespace std;

int main()

{

int n, reverse=0, rem;

cout<<"Enter a number: ";

cin>>n;

while(n!=0)

Explanation:

Which of the following is NOT a valid name for a function?

A. Poker

B. Black Jack

C. Solitare

D. 52CardPickup

Answers

Answer:

B and D

Explanation:

We must follow naming conventions while naming a function. The following are the rules:

Function names can start with a letter followed by letters and digits

Function names can start with a underscore followed by letters  and digits

Function names cannot start with a number.

Function names cannot have space between words.

Based on above rules, options B and D violate the rules. So they are invalid function names

IRQ 0 interrupt have _______________ priority
? low
? medium
? highest
? lowest

Answers

Answer:

Highest

Explanation:

A interrupt request / IRQ is in which instructions are sent to Cpu and uses an interrupt handler to run distinct program . Hardware interrupts are used to manage occurrences such as obtaining modem or network card information, important presses, or mouse motions.

Interrupt request 0. – it is a system timer (can not be altered) Interrupt request 1 – keyboard controller (can not be changed) Interrupt request 2 – cascaded IRQ 8–15 signals (any device configured to use IRQ 2 will genuinely use IRQ 9) Interrupt request 3 – serial port 2 controller Interrupt request 4 –  serial port 1 controller Interrupt request 5 –parallel port 2 and 3  Interrupt request 6 - floppy disk controller  Interrupt request 7 –parallel port 1. If a printer is not present, it is used for printers or for any parallel port. It can also possibly be shared with a secondary sound card with cautious port management.

As interrupt number increases priority level decreases, Priority level 0 is the highest priority level .

what is Software Process Improvement?

Answers

Answer:

Software Process Improvement (SPI) methodology is defined as a sequence of tasks, tools, and techniques to plan and implement improvement activities to achieve specific goals such as increasing development speed, achieving higher product quality or reducing costs.

Software Process Improvement (SPI) is the practice of enhancing software development processes to improve quality and efficiency. It often utilizes methods like Six Sigma's DMAIC framework. The goal is to create consistent, high-quality software products.

What is Software Process Improvement?

Software Process Improvement (SPI) is the practice of analyzing and enhancing the software development processes within an organization to improve the quality, efficiency, and overall performance of software delivery.

By identifying inefficiencies and variations in current processes, companies can implement more effective methodologies that lead to higher quality products. One common method used in SPI is Six Sigma, which employs the DMAIC (Define, Measure, Analyze, Improve, Control) framework.

To implement Software Process Improvement, follow these steps:

Define: Identify the processes that need improvement and establish goals.Measure: Collect data on current processes to understand existing performance levels.Analyze: Examine the data to identify sources of inefficiencies or defects.Improve: Develop and implement strategies to rectify identified issues.Control: Monitor the improved processes to ensure sustainability and continuous improvement.

Quality improvement techniques, such as process mapping and the PDCA (Plan, Do, Check, Act) cycle, can also support SPI efforts. Through these methods, organizations aim to achieve more consistent, reliable, and high-quality software products

Let s be a stack. Consider the following program:

s.push(1);
s.push(2);
s.push(3);
s.pop();
s.push(4);
s.pop();
s.pop();
int x = s.peek();

What is the value of x after the assignment statement?

Answers

Answer:

Hi

In the first scenario we have

S = []

then:

S=[1],

S=[2,1]

S=[3,2,1]

S=[2,1]

S=[4,2,1]

S=[2,1]

S=[1]

So when it's call the method peek to S, X will be assigned 1

Explanation:

Stack is a linear data structure which follows a particular order in which the operations are performed. The order may be LIFO(Last In First Out). There are many real-life examples of a stack. Consider an example of plates stacked over one another in the canteen. (Taken from wikipedia)

- The method push is to put the element on the top of the stack

- The method pop is take out the top element of the stack

- The method peek is to see what is the top element of the stack

To use a stored address, C provides us with an indirection operator, ____.
A) %
B) ^
C) &
D) *

Answers

In C programming language indirection operator & is used to access pointer variable value.

The answer is therefore C.

Hope this helps.

r3t40

Entering the search criteria "B?" would yield which of the following results?

A. Bentonville
B. Be
C. Bedford
D. Birmingham

Answers

Answer:

D. Birmingham

Explanation:

Entering the search criteria "B", would yield Birmingham.

Answer:

THE CORRECT ANSWER IS Be

Explanation:

An 8x16 font isstored in _________________ bytes.
? 8
? 16
? 4
? 20

Answers

Answer:

The answer to this question is 16 bytes.

Explanation:

8x16 font means it contains 16 rows by 8 columns of 1-bit pixel ( picture element ).

rows=16.

columns=8.

8 bit = 1 byte.

8x1 = 1 byte.

8x16 = 16 bytes.

So 8x16 font size requires 16 bytes of data to store a character.Hence we conclude that the answer is 16 bytes.

What is a regular expression that would match any digit 1-999?

Answers

Answer:

[1-9][0-9]{0,2}

Explanation:

The numbers to be matched consist of three digits with the following requirements:

- Digit 1 can take the values 1-9

- Digit 2 can take the values 0-9

- Digit 3 can take the values 0-9

- Digits 2 and 3 are optional, that is the number may consist of 1,2 or 3 digits in all.

Taking these into account, the overall regular expression can be represented as follows:

[1-9][0-9]{0,2}

In Java the ______________are not objects. All of the rest areobjects, or any ___________ is called as object.
generic type , reference type
primitive types , generic type
Reference type , generic type
Reference type , primitive types

Answers

Answer:

Reference type,generic type

Explanation:

Reference types are used by a reference that maintains a reference (address) to the object but not the object itself. Because reference kinds reflect the variable's address rather than the data itself, assigning a reference object to another does not copy the information. Instead, it produces a second duplicate of the reference, which relates to the same heap place as the initial value.

Examples of reference types are Classes, Arrays,, Interfaces etc.

A generic type is a generic class or interface that is parameterized over kinds. Essentially, generic types enable you to write a particular, generic class (or method) that operates with distinct kinds, enabling code to be reused.

The class Object  describes the conduct of all Java objects. However, it does not describe the conduct of all Java data structures. That's because not all Java data structures are objects. Some of them are primitive values that can be stored in object variables, but they are not objects themselves.

Unlike object types, primitive types are not sub types or super types.

Other Questions
What is the force that can cause two pieces of iron to attract each other?A. gravitational forceB. magnetic forceC. elastic forceD. electrostatic force The value of x is?8496132264HELPPPP!!!! Why are the male testes located in the scrotum, outside the body? (A) Their external location is necessary for penile development.(B) The testes develop better outside the body.(C) It helps the male secondary sexual characteristics develop.(D) Spermatogenesis is temperature sensitive. Which of the following equations is of a parabola with a vertex at (0,3)?y= (x - 3)2y= (x + 3) 2y=x2-3y= x2 + 3 Factor each expression. Show your work. 11. r2 + 12r + 27 12. g2 9 13. 2p3 + 6p2 + 3p + 9 Expand and simplify (X+5)(X+1) For all gas law calculations, the temperature must be in kelvins. (T/F) Work out the Wronskian for the following pairs of functions and state whether the are linearly dependent or linearly independent in the interval x (01). (Please Show All Work!!! Y; (x)=sin(x); y2(x)= xsin(x) Please Show All Your Work, Or Risk Losing All Points x+(0, ') Votre Pom Growth of a new capillary supply into the region produces granulation tissue.a. Trueb. False Stores of this form of carbohydrate are released from the liver to help maintain constant blood glucose levels. 1.) Type the following sentences correctly, inserting commas if necessary. Tomorrow we plan to rent the movie Patch Adams.2.) Type the following phrase with the appropriate use of colons. Dear General Armstrong 3.) Type the following phrase with the appropriate use of colons. List the following lions, tigers, bear4.) Type the following sentences with the appropriate use of commas. Raised in Seattle Sue Ellen wondered what it would be like live in New Orleans.5.) Type the following phrase with the appropriate use of colons.Dear Miss Poole plz.. help me this out I am from nepal actually it is math Why was Newt Gingrich a significant political figure in the 1990s?He and his supporters fought against the balanced budget amendment.He was the first Republican to serve as Speaker of the House in forty years.He challenged Bill Clinton for the Democratic presidential nomination.He led a movement against tax cuts proposed in the Contract with America. Kevin and Randy Muiso have a jar containing 61 coins, all of which are either quarters or nickels. The total value of the coins in the jar is $12.05. How many of oach type of coin do they have? The jar contains iguarters 10 points Help please 2. In a barnyard, there is an assortment of chickens and cows. Counting heads, one gets 80; counting legs, one gets 184. How many of each are there? Note: To receive credit for this problem you need to define the variables, write a system of equations and solve the system to answer the question. If point P is 4/7 of the distance from M to N, what ratio does the point P partition the directed line segment from M to N into?4:14:34:74:10 Find the slope of the line that passes through the points (-1, 1) and (2, 7). We are taught that cleanliness is a vital part of daily life, that antibacterial soaps, cleaning products that completely eliminate the possibility of germs on surfaces, cooking and food handling that absolutely precludes the chance of ingesting a bug, is an essential path to good health. This approach is now under scrutiny because of our understanding of Complete the table for the given rule y=x-3