Operation at a certain track begins

Assignment Help Basic Computer Science
Reference no: EM131158098

We use the elevator algorithm to service requests on a disk with the following characteristics:

1. There are 10,001 tracks, numbered 0 to 10,000.

2. It takes time 1+(t/1000) milliseconds to move the headttracks.

3. Once arriving at a track, it takes 1 ms. to satisfy a request for I/O at that track.

4. The decision regarding what track to visit next is made based on all requests made at or before the time at which the previous read completes, subject to the "elevator" rule that the head continues to sweep in the same direction, if possible.

5. At time 0, the head is at track 0, at rest.

Here is the sequence of I/O requests and the times at which they are made:

0

7000

5

2000

10

9000

15

6000

20

3000

Simulate the behavior of the elevator algorithm for these requests. Which of the following correctly describes the time (in milliseconds) at which the I/O operation at a certain track begins?

Reference no: EM131158098

Questions Cloud

Class definition for queue : Write the class definition for this queue, in pseudocode or C++, which has the array, head and tail pointers as public data structures, and enque(int) and int dequeue() as two methods. The contsructor initializes head and tail pointers to NULL.
Does the information media have social responsibility : Answer the following questions: Does the information media have social responsibility? If yes, in what ways? If not, why not? What is the role of the information and news media in the shaping of political opinions
How many simultaneous message could be set along this system : In actual system only 672 message channels are used. The additional pulses are used for other functions such as synchronization
Describe the ways in which homeless is a social problem : Some of the policies suggested in the video involve government policies and funds to address homelessness. Suggest at least one other way that policies and/or programs to address homelessness can be funded. How do you define what is appropriate u..
Operation at a certain track begins : Simulate the behavior of the elevator algorithm for these requests. Which of the following correctly describes the time (in milliseconds) at which the I/O operation at a certain track begins?
What is common law : What is common law? Where did it develop? Why is it an important aspect of the legal system
What temperature will be indicated by the thermocouple : What temperature will be indicated by the thermocouple? Assume free convection from the thermocouple.
Why you not expect all industries to have a similar relation : Discuss why you would not expect all industries to have a similar relationship trend to the economy. Provide an example of two industries that have a different relationship to the economy and explain the difference.
Research and development commitments : Teradata needs to prioritize its research and development commitments. In order to do this they must have all the information available and accurate. This requires integrating data from many sources both internal and external.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program to calculate the outcome of a competition

The divers take turns, and when the competition is finished, they are ranked according to score. Write a program to calculate the outcome of a competition

  Theurl of the article

Find 1 article related to  security and the cloud. and to turn in the following: (1) TheURL of the article, (2) A brief summary of the article

  How value parameters useful in processing data in a program

Discuss some useful applications for n-dimensional arrays, such as graphical 3-D or biotechnology applications.

  A static method that takes an array of integers as parameter

Write a static method that takes an array of integers as a parameter and returns back an integer that is the sum of all of the integers in the array.

  Describe human successes and failure in technologies

Describe human successes in five technologies and human failures in five different technologies.

  Why is it that security mechanisms are still needed

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

  Find a more accurate formula

Find the values of A and B such that error is minimized. What power of h is the error proportional to. Use the formula to find d/dx sin(x) at x =pi/3.

  Analyze the potential readability

Analyze the potential readability problems with using closure reserved words for control statements that are the reverse of the corresponding initial reserved words

  Two network security software tools

They must be of a type listed on page 22. Other types are not acceptable unless explicitly agreed by the module leader. c. They must be agreed with your module leader. The means of reaching this agreement are described below.

  Write a c program to generate a sine waveform

Divide one period of the sine wave into 60 points and use these 60 points to represent the waveform. Every two adjacent points are separated by 3.0°.

  Create a windows application that includes four groups

Create a Windows application that includes four groups of two radio buttons each.

  Using digital forensic tools or encryption tools

Using digital forensic tools or encryption tools in the virtual lab to extract the text in the picture (10%) and answer the question (10%).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd