Calculate in msec the average time needed to search

Assignment Help Basic Computer Science
Reference no: EM131053900

Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking. Write appropriate formulas and calculate the following values for the above EMPLOYEE file:

a. The record size R (including the deletion marker), the blocking factor bfr, and the number of disk blocks b.

b. Calculate the wasted space in each disk block because of the unspanned organization.

c. Calculate the transfer rate tr and the bulk transfer rate btr for this disk unit (see Appendix B for definitions of tr and btr).

d. Calculate the average number of block accesses needed to search for an arbitrary record in the file, using linear search.

e. Calculate in msec the average time needed to search for an arbitrary record in the file, using linear search, if the file blocks are stored on consecutive disk blocks and double buffering is used.

f. Calculate in msec the average time needed to search for an arbitrary record in the file, using linear search, if the file blocks are not stored on consecutive disk blocks.

g. Assume that the records are ordered via some key field. Calculate the average number of block accesses and the average time needed to search for an arbitrary record in the file, using binary search.

Reference no: EM131053900

Questions Cloud

Explain what conditions must be true for a restaurant : Explain what conditions must be true for a restaurant to find it in its best interest to be open for lunch. Which costs are relevant when making the decision to stay open?
Calculate the number of blocks needed for the file : Calculate the number of blocks needed for the file.
What role did the various layers of aviation security play : What role did the various layers of aviation security play in preventing the attempted attacks after 9/11? Explain - were the effective layers tactical, policy driven, or a combination of both? Explain.
Analysing the important features of qube : After reading further background material on the company and relevant case studies on related companies, prepare a 2300 -2500 word report analysing the important features of Qube, and identify logistics management strategies to resolve the issues
Calculate in msec the average time needed to search : Assume that the records are ordered via some key field. Calculate the average number of block accesses and the average time needed to search for an arbitrary record in the file, using binary search.
Affect an organization entering in that industry : Prepare a research report of industry characteristics that will affect an organization entering in that industry. Your description must contain the following aspects:
How many fish will you catch to maximize profit : Suppose that you can sell each fish for $5. How many fish will you catch to maximize profit? Explain. Suppose that you purchase your rod and begin fishing. Suddenly, the price of fish drops to $2.10 each. How many fish will you catch to maximize p..
What is russias stand in climate change : What is Russias stand in climate change? What are the biggest problems enviromentally?
Allocation between public and private goods : What happens to the efficient allocation between public and private goods as an economy becomes wealthier?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Present value of these payments

Suppose that you will receive $100 in 4 years (end of year 4) and every even year thereafter (year 6, 8, ...) you will receive a payment that is 5% bigger than the prior payment. What is the present value of these payments assuming the discount ..

  Program to evaluate a post?x expression

1. Write a program to evaluate a post?x expression. 2. a. Write a program to convert an in?x expression that includes (, ), +, -, *, and / to post?x.

  The location of the identification system utilized

Considering the provided information select a specific location at your current place of employment (another location if necessary) and describe the employed IDS devices that protect both the perimeter and interior spaces of a specific building or..

  What would be the output

What would be the output if we try to execute following segment of code (assuming the following input "cool brother in city")?

  Comp dq microsoft''s website

This discussion board allows you to work with Word templates available on Microsoft's website. First, download a Word template from Microsoft.com by clicking Office, then Templates, then Word. Replace the placeholders with your own content. Upload..

  Shows four technological developments

Create a timeline that shows four technological developments that have had an impact on the way that people seek out marriage or life partners. The timeline should cover the period between 1900 and the present.

  Routine and standardized and chaotic is a major challenge

Keeping professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and pr..

  Construct a simple xml schema

Construct a simple XML schema that describes a tutor. Include the tutor's last name, first name, phone, email address, and the certification date as child elements of the TUTOR element.

  Create a mailmerge

Create a Mailmerge-Your form letter must include an inserted picture or graphic and should give the address of a web site

  Determine which resumes are chosen for further scrutiny

determine which resumes are chosen for further scrutiny. Is such screening fair to applicants? Why or why not? Justify your answers using examples and reasoning.

  Sql statements work without issue

Use SQL to Create a table with at least 4 attributes one of which is the Primary key. Then, insert 2 records into the table. Finally, use a select statement to show the content of your table after the inserts. Be sure your SQL statements work with..

  Identify organizations that may be susceptible

Acts considered cyberterrorism and / or information warfare can be divided into four separate categories; infrastructure attacks, information attacks, technological facilitation, and promotion.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd