How many physical blocks must be read from the disk

Assignment Help Basic Computer Science
Reference no: EM131231957

Consider a file system on a disk that has both logical and physical block sizes of 512 bytes. Assume that the information about each file is already in memory. For each of the three allocation strategies (contiguous, linked, and indexed), answer these questions:

a. How is the logical-to-physical address mapping accomplished in this system? (For the indexed allocation, assume that a file is always less than 512 blocks long.)

b. If we are currently at logical block 10 (the last block accessed was block 10) and want to access logical block 4, how many physical blocks must be read from the disk?

Reference no: EM131231957

Questions Cloud

Analyze the new business realities relative to wheatley : Describe examples from your work experience that reflect Wheatley's observations. Analyze the New Business Realities relative to Wheatley's leadership best practices
Can the system reconstruct the free-space list : Consider a file system similar to the one used by UNIX with indexed allocation. How many disk I/O operations might be required to read the contents of a small local file at /a/b/c? Assume that none of the disk blocks is currently being cached.
What are the different levels of granularity : Discuss how performance optimizations for file systems might result in difficulties in maintaining the consistency of the systems in the event of computer crashes.
How your attitude about effective management has been affect : Post a 200- to 250-word explanation of how your attitude about effective management has been affected by the information you gained regarding statistics in this course.
How many physical blocks must be read from the disk : If we are currently at logical block 10 (the last block accessed was block 10) and want to access logical block 4, how many physical blocks must be read from the disk?
Develop six sigma metrics based on this case study : Develop Six Sigma metrics based on this case study. In other words, what 5 items will you measure on a constant basis? Explain why you selected these 5 measurement elements.
Why recompacting and relocation of files are often avoided : Consider a file system that uses inodes to represent files. Disk blocks are 8 KB in size, and a pointer to a disk block requires 4 bytes. This file system has 12 direct disk blocks, as well as single, double, and triple indirect disk blocks. What ..
How institutional racism is present in many urban schools : Specific content referring to the lives of students in urban, mixed-race schools, How institutional racism is present in many urban schools and How racism, discrimination, and prejudice often exist in an urban high school
Why logging metadata updates ensures recovery of file system : Assume that in a particular augmentation of a remote-file-access protocol, each client maintains a name cache that caches translations from file names to corresponding file handles. What issues should we take into account in implementing the name ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the zero product property

What is the zero product property? Provide at least two examples of solving quadratic equations by factoring and using the zero product property.

  Write instruction that can write two locations automically

Consider the k-Write instruction. Can this k-Write instruction be used to implement a wait-free consensus protocol for k processes? Justify your answer.

  Different methods of user-based

Question 1: Discuss different methods of user-based and user-controlled navigation. Define five common types of links used in a navigation system.

  De?nition of garbage

This question asks you to think about garbage collection in Lisp and compare our de?nition of garbage in the text to the one given in McCarthy's 1960 paper on Lisp. McCarthy's de?nition is written for Lisp speci?cally, whereas our de?nition is sta..

  Define using biometrics to identity a terrorist in a crowd

What is the difference between using biometrics to ensure that only certain employees enter a bank vault and using biometrics to identity a terrorist in a crowd. Which application is more reliable and why. Assume that we're using facial recognitio..

  How this sample of data points is nonlinearly transformed

The example given in Fig. 5.1b depicts a spherically separable dictomy Assume that the four data points outside the separating surface lie on a circle and that the only data point inside lies at the center of the separating surface

  Write a program that reads in two floating-point numbers and

Write a program that reads in two floating-point numbers and tests whether they are the same up to two decimal places. here are two sample runs.

  Computer professionals advocate of exposing the details

Could someone explain to me what does it means to believe that all systems and applications must provide for an abstraction from the details of the implementation and other computer professionals advocate of exposing the details?

  Organizational of infrastructure and security

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalab..

  Show that the circuit has size o(n) and depth o(log n)

Give a construction of a circuit for subtracting one n-bit positive binary integer from another using the two's-complement operation. Show that the circuit has size O(n) and depth O(log n).

  Snow fall program

Snow Fall Program: A Write a program that can be used by a ski resort to keep track if local snow conditions for one week. It should have two seven-element arrays to store the date and number of inches of snow. First, the program should ask the user ..

  How these implementations schedule parent and child process

Experiment with the program in Listing 24-5 (fork_whos_on_first.c) on other UNIX implementations to determine how these implementations schedule the parent and child processes after a fork().

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd