Data blocks accesses to fetch record using linear search

Assignment Help Basic Computer Science
Reference no: EM1387982

Suppose one file has r =106 records. Each record takes R = 100 bytes, of which 10 bytes are for key of record. Assume key values range from 1 through 1,000,000, inclusive. suppose block size B is 1000 bytes for all files, and that address (block pointer, tree node pointer, or data record pointer) takes 10 bytes.

1. Sequential file
a. What is the blocking factor bfr for file ?
b. How many data blocks b are required to hold records ?
c. How many data blocks accesses on the average are required to fetch the record using linear search ?
d. How many data blocks accesses are required to fetch a record using binary search ?

Reference no: EM1387982

Questions Cloud

Ethical and legal issues in healthcare : As required by law, every health care facility must maintain a medical record for each patient that it treats (Pozgar, 2004). Although the exact specifications may vary slightly across each state,
Asset allocation of the portfolio : The following table describes the asset allocation of your portfolio with the corresponding return in percentage, X, and the proportion of that specific asset in the portfolio, P(X).
Chromosomal complement of the embryo : A species has a diploid number of 2n. Meiosis I fails during spermatogenesis, cytoplasm does not divide and only one daughter cell is manufactured. The resulting sperm fertilizes a normal ovum.
Five areas of negligence for allied health professionals : Mention five areas of negligence for allied health professionals. Discuss the standard of care in each area, and how that standard can be applied to the health care facility.
Data blocks accesses to fetch record using linear search : How many data blocks accesses on the average are required to fetch the record using linear search? How many data blocks accesses are required to fetch a record using binary search?
Five steps of hypothesis testing : Use the five steps of hypothesis testing to determine whether the observed differences in the number of activities in the following table performed by the three groups are statistically significant at the .05 level of significance. Clearly indicat..
Non-prescription samples and ethics : A physician is given non-prescription vitamin samples that are expensive and are to be given to patients of low income. Employees took samples home for their personal use.
Fiber size of cross sectional area and strength : Determine which intracellular change is the most contributor to increases in fiber size of cross-sectional area and strength?
Develop tactical plans to implement established strategies : How is it possible for individuals and organizations to fail to focus on customers? Some functions can have both internal and external customers

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Financial impact of change on wvu students

Currently, PRT riders who are not WVU students or employees must pay $0.50 per trip. Assume that this charge was eliminated.

  Actions against company security camera

Joe the janitor is recorded on the company security camera one night taking pictures with his cell phone of the office of the CEO after he is done cleaning it. What will you do and what is your justification for your actions?

  Find probability of having no umbrella if it rains

When rain is forecast, Mr. Pickwick takes his umbrella. When rain is not forecast, he takes it with  probability 1/3. Find the probability that Pickwick has no umbrella, given that it rains.

  Ways to send these postcards to friends

There are k types of postcards, each with limited amount. Let there be ai copies of i-th postcard. How many ways are there to send these postcards to n friends?

  Cryptography for standardized regulated and mandated

Whose interests are most significant when finding extent to which cryptography must be standardized, regulated, and mandated?

  What are different types of memory

What are some of the newer technology innovations you have seen in regards to I/O and Memory? What are the different types of Memory and how much is recommended?

  Cloud computing to the rescue

Cloud computing provides scalable computing resources, software applications, data storage, and networking infrastructure at cost below what would cost an organization to provide an equivalent infrastructure internally.

  Performance of receiver-initiated load sharing algorithm

Predict the performance of receiver-initiated load sharing algorithm when entire system workload is generated at only a few nodes in the system instead of equally.

  How to make components of system user-friendly

How do components of your computer system interact within system? What improvements or additions to your system do you think would benefit you or make system more user-friendly? Why?

  Explain what occurs if instruction going through pipeline-lb

Consider processor with six stages: IF(instruction fetch), DA(instruction decode), CO(calculate operands addresses), FO(fetch operands), EX(instruction execution), WB(write results). Explain briefly what occurs in each stage when instruction going ..

  Explaining organization management responsibilities

Describe in scholarly detail common organization management responsibilities.

  Write bash shell script filestatic to examine number files

Write bash shell script filestatic. Script should examine the number files in directories given as arguments (parameters) to this script.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd