Calculate the blocking factor bfr

Assignment Help Basic Computer Science
Reference no: EM131053909

A file has r = 20,000 STUDENT records of fixed length. Each record has the following fields: Name (30 bytes), Ssn (9 bytes), Address (40 bytes), PHONE (10 bytes), Birth_date (8 bytes), Sex (1 byte), Major_dept_code (4 bytes), Minor_dept_code (4 bytes), Class_code (4 bytes, integer), and Degree_program (3 bytes). An additional byte is used as a deletion marker. The file is stored on the disk whose parameters are given in Exercise 17.27.

a. Calculate the record size R in bytes.

b. Calculate the blocking factor bfr and the number of file blocks b, assuming an unspanned organization.

c. Calculate the average time it takes to find a record by doing a linear search on the file if (i) the file blocks are stored contiguously, and double buffering is used; (ii) the file blocks are not stored contiguously.

d. Assume that the file is ordered by Ssn; by doing a binary search, calculate the time it takes to search for a record given its Ssn value.

Reference no: EM131053909

Questions Cloud

What is the total capacity of a track : What is the total capacity of a track, and what is its useful capacity (excluding interblock gaps)?
Product as ameasure of economic performance : What are some of the limitations using gross national product as ameasure of economic performance?
What is the flaw of argument : A common argument in favor of minimum wage laws is that they are necessary to prevent employers from taking unfair advantage of their employees. What is the flaw of this argument? Please include a example.
What is meant by more productive a resource is more demand : What is meant by "The more productive a resource is, the more it will be in demand." Can you provide an example?
Calculate the blocking factor bfr : Calculate the average time it takes to find a record by doing a linear search on the file if (i) the file blocks are stored contiguously, and double buffering is used; (ii) the file blocks are not stored contiguously.
What is the smallest number of hours : Ying threatens not to work on the project. For Ying's threat to be credible, what is the smallest number of hours that Xavier must contribute to the project? How much time does Xavier contribute? Does Ying work on the project?
Why should entrepreneurship models include ethics : Why should entrepreneurship models include ethics and social responsibility?
Human resource functions at a glance : Based upon your research, prepare a case study about the human resource functions necessary for the 2016 Olympics to be held in Rio de Janeiro, Brazil.
Embark on quantitative easing in early : For quantitative easing, why did Britain, the USA, Japan, the European Monetary Union and others embark on quantitative easing in early 2009 but not Australia?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How is privacy related to statistical database security

How is privacy related to statistical database security

  An iterative algorithm to traverse an arbitrary number

An iterative algorithm to traverse an arbitrary number of nested subdirectories in a file system.

  Define data access controls in the erp software to deny

Assignment builds on the scenario of Ken 7 Windows Limited given as the last section of this document. For this assignment, imagine yourself to be a security administrator working for Ken 7 Windows Limited. You have been asked to evaluate the option ..

  Needs to be entered into a new database

Brian has a list of customers that needs to be entered into a new database. Before Brian can begin entering records into a database, he must first A. create a form to display the customer's information. B. enter information into an Excel spreadsh..

  Detailed description of learning activity

Detailed Description of Learning Activity

  Which of the following is not a join in sql

Which of the following is not a join in sql?

  What are the typical kinds of entries in a system log

What are the typical kinds of entries in a system log? What are checkpoints, and why are they important? What are transaction commit points, and why are they important?

  Add subtraction and division operators with the customary

Start with the grammar G6, repeated here G6: ::= + | Start with the grammar G6, repeated here G6: ::= + | ::= * | ::= ( ) | a | b | c Modify it in the following ways: a. Add subtraction and division operators (- and /) with the customary precedence a..

  Services for a wireless network

List and briefly define IEEE 802.11 services for a wireless network.

  How to simulate

Here, each line is a process. First int is ID, second integer is CPU time. CPUunitQ is a queue that stores the index # for available cpu units. How to simulate?

  Better software tool internet explorer or mozilla firefox

There are several Internet browsers available today, and many people select which to use without giving it consideration. Explain which is better software tool: Internet Explorer, Mozilla Firefox, or Google Chrome?

  0.4 of students are women and gpa for women

0.4 of students are women and gpa for women has mean of 3 and sd 0.8; Gpa for men has mean of 2.5 and sd of 1.0. a sample size of 100 students which consist 40 women and 60 men.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd