Calculate total communication time required to retrieve rows

Assignment Help Basic Computer Science
Reference no: EM1363671

User queries the Part table in the Premiere Products database over the company intranet. Assume the Part table contains 5,000 rows, each row is 1,000 bits long, the access delay is 2.5 seconds, the transmission rate is 50,000 bits per second, and only 20 of the 5,000 rows in the Part table satisfy the query conditions. Calculate the total communication time required for this query based on retrieving all table rows one row at a time; then calculate the total communication time required based on retrieving the 20 rows that satisfy the query conditions in a single message.
You do not need the Premiere Products database to answer this question.

The formula is:

The total communication time to retrieve all rows, one row at a time is:
The total communication time to retrieve the 20 rows in one message is:

Reference no: EM1363671

Questions Cloud

How long after the first strike does wilma hears the sound : How long after the first strike does Wilma hears the sound. What is the time interval between successive sound pulses she hears.
Explain simple issue specific security policy in school : Rrules and regulations you have been provided with in your institution.does your school have a similar policy?does it contain all the elements listed in the text?
Entrepreneurial process in the health care field : What role do regulatory requirements play in the entrepreneurial process in the health care field? What can health care entrepreneurs do to establish a solid ethical and legal foundation?
Determine stock price : CK's earnings and dividends will grow at .5 percent monthly for next five years. After that the growth will stop. For year sixnd afterward, it will pay out all earnings as dividends.
Calculate total communication time required to retrieve rows : Calculate the total communication time required based on retrieving the 20 rows that satisfy the query conditions in a single message.
Inefficiencies of market : Suppose your uncle made a killing in the stock market yesterday. This implies that markets are inefficient. Determine the correct answer.
Key stakeholder for implementation plan : Describe the elements of a successful implementation plan. Discuss how you would insure these elements were communicated to the key stakeholder for the implementation plan.
Estimate the standard deviation of a portfolio : Stock X has a standard deviation of returns of 0.6, and Stock Y has a standard deviation of 0.4. The correlation of the two stock is 0.5.
Find out the recoil velocity that the raft : Find out the recoil velocity that the raft. At what height above the cannon should the net be placed in order to catch the daredevil.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Iidentify primary types of media employed

For the network that you have chosen to characterize for this class, identify the primary types of media employed. Be sure to include both how the computers individually connect.

  Rating of vital for page with highest utility

Rating of Vital is always given to the page with the highest utility.

  Find the probability both windows are idle

The post office uses a multiple channel queue, where customers wait in a single line for the first available window.  the probability both windows are idle.

  Explain dynamic programming approach-longest weighted path

Assume we have a directed acyclic graph G = (V, E) with real-valued edge weights and two distinguished vertices s and t. Explain a dynamic programming approach for ?nding a longest weighted simple path from s to t.

  Data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs, Flash RAM, and solid-state drives

  Deliver software to a schedule

You are asked by your manager to deliver software to a schedule that you know can only be met by asking your project team to work unpaid overtime.

  Significant tool to help discover security breaches

Auditing is an significant tool to help discover security breaches, yet many organizations do not implement auditing practices.

  Values for the items in the risk register

Recommend reasonable values for items in risk register for this asset and threat, and give justifications for your choices.

  Compute number of total bits needed to implement cache

Suppose a computer's address size is K bits (using byte addressing), the cache size is k bits (using byte addressing), the cache size is S bytes. Compute the number of total bits needed to implement the cache.

  What is the asymptotic time complexity of algorithm

Suppose an algorithm has two parts. The first part involves sorting and takes (10 nlog n) steps, where n is the input size. What is the asymptotic time complexity of the overall algorithm, in Big Theta notation?

  Business reprocess engineering-strategic information system

Some people may say that Business Reprocess Engineering (BPR) is special case of strategic information system, whereas, others may say opposite is true. Describe this statement in scholarly detail.

  What type of hardware is needed to support t-1 connection

What kind of hardware is needed to support a T-1 connection to your business? You want to write a song and apply a digital signature to it, so that you can later prove that it is your song.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd