Why recompacting and relocation of files are often avoided

Assignment Help Basic Computer Science
Reference no: EM131231955

1. Consider a file system that uses inodes to represent files. Disk blocks are 8 KB in size, and a pointer to a disk block requires 4 bytes. This file system has 12 direct disk blocks, as well as single, double, and triple indirect disk blocks. What is the maximum size of a file that can be stored in this file system?

2. Fragmentation on a storage device can be eliminated by recompaction of the information. Typical disk devices do not have relocation or base registers (such as those used when memory is to be compacted), so how can we relocate files? Give three reasons why recompacting and relocation of files are often avoided.

Reference no: EM131231955

Questions Cloud

What are the different levels of granularity : Discuss how performance optimizations for file systems might result in difficulties in maintaining the consistency of the systems in the event of computer crashes.
How your attitude about effective management has been affect : Post a 200- to 250-word explanation of how your attitude about effective management has been affected by the information you gained regarding statistics in this course.
How many physical blocks must be read from the disk : If we are currently at logical block 10 (the last block accessed was block 10) and want to access logical block 4, how many physical blocks must be read from the disk?
Develop six sigma metrics based on this case study : Develop Six Sigma metrics based on this case study. In other words, what 5 items will you measure on a constant basis? Explain why you selected these 5 measurement elements.
Why recompacting and relocation of files are often avoided : Consider a file system that uses inodes to represent files. Disk blocks are 8 KB in size, and a pointer to a disk block requires 4 bytes. This file system has 12 direct disk blocks, as well as single, double, and triple indirect disk blocks. What ..
How institutional racism is present in many urban schools : Specific content referring to the lives of students in urban, mixed-race schools, How institutional racism is present in many urban schools and How racism, discrimination, and prejudice often exist in an urban high school
Why logging metadata updates ensures recovery of file system : Assume that in a particular augmentation of a remote-file-access protocol, each client maintains a name cache that caches translations from file names to corresponding file handles. What issues should we take into account in implementing the name ..
How can the company mitigate these risks : The account managers (AM) do not communicate with sales engineers (SE) early in the pre-sales cycle. The lack of early engagement and communications with the SE leads to rushed deadlines and last minute changes to the Scope of Work (SOW) contract...
Are restore operations made easier or more difficult : This differs from the schedule given in Section 12.7.4 by having all subsequent backups copy all files modified since the first full backup. What are the benefits of this system over the one in Section 12.7.4? What are the drawbacks? Are restore o..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Expecting the user to input two variable values

A painting company has determined that for every 115 square feet of wall space, 1 gallon of pain and 8 hours of labor will be required. The company charges $20.00 per hour for labor. Create an application that allows the user to enter the square f..

  Importance in technological innovation in firm

What is technology diffusion and discuss its importance in technological innovation in a given firm?

  Organization encourage positive organizational behavior

Does Google as an organization encourage positive Organizational Behavior? If yes, in what ways and give examples. 300-350 words

  Intro to comp sci question

Intro to COMP SCI question The table below lists a series of specific mitigation strategies. For each of the threat scenarios described below, list all of the mitigation strategies below that can significantly improve security antivirus software file..

  Display a message explaining why it is not valid

display a message explaining why it is not valid.

  What power of h is the error proportional to

Find the values of A and B such that error is minimized. What power of h is the error proportional to? Use this formula to find d/dx sin(x) at x = pi/3. Tabulate errors for different values of h.

  Employee privacy expectations concerning mobile devices

Propose an organizational policy that addresses both business needs and employee privacy expectations concerning mobile devices. How would the policy differ from employer provided and bring your own devices?

  What would you recommend as a backup solution

You need to make sure that you back up the databases each night in case you have a disaster and must recover them from backup. Because each database takes two hours to back up and you only have a six-hour window in which to do backups each day, wh..

  Discuss five of top current it issues in higher education

Discuss Five of the top current IT issues in Higher Education

  Design phase or in the coding phase

Are there more defects in the design phase or in the coding phase?

  Mission and values of better world books

What are the mission and values of Better World Books? Critically evaluate their usefulness to the company's management in formulating strategy.

  Develop and defend a business continuity proposal

Task goals · Develop and defend a business continuity proposal based on sound research for the information technology needs of an organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd