What conclusion can you draw about disk block size

Assignment Help Operating System
Reference no: EM13869495

Studies of different file systems have shown that more than half the files are a few KB or smaller, with the vast majority of files less than something like 8 KB. On the other hand, the largest 10 percent of all files usually occupies about 95 percent of the entire disk space in use. From this data, what conclusion can you draw about disk block size?

Reference no: EM13869495

Questions Cloud

Define and discuss the open shop movement : Define and discuss the open shop movement.
Do you think that files are stored in consecutive sectors : All files may grow dynamically during execution without giving the operating system any advance information about their ultimate size. Do you think that files are stored in consecutive sectors? Explain.
What emotional consequences might thelma experience : Did Thelma do the right thing by revealing her knowledge of her father's drug use to her mother? Explain why. What behavioral and emotional consequences might Thelma experience as a result of her situation
Compare kotter''s and lewin''s recommended change models : Compare Kotter's and Lewin's recommended change models.
What conclusion can you draw about disk block size : On the other hand, the largest 10 percent of all files usually occupies about 95 percent of the entire disk space in use. From this data, what conclusion can you draw about disk block size?
Does the method work if there is a single cpu switches : Does this method work if There is a single CPU that switches between processes every 100 msec and Two CPUs share a common memory in which the semaphore is located?
What advantage is gained by using queue for waiting process : What advantage is gained by using a queue for waiting processes as opposed to waking a random sleeping processes when an up is performed?
What are the potential long-term consequences for rosie : Which of the four most common roles in family systems do you think Rosie is taking on? What are the potential long-term consequences for Rosie in taking on these heavy responsibilities
Gunpowder corp.''s board of directors approved a : On November 6, 2009, Gunpowder Corp.'s board of directors approved a share option plan for key executives. On January 2, 2010, a specific number of share options were granted.

Reviews

Write a Review

Operating System Questions & Answers

  Discuss main reasons for it project failures

Discuss the main reasons for IT project failures? Are they because of problems with project management life cycle, product development life cycle,

  Differences between windows server 2008 and 2012

This Course Project will be a research report that will cover five of the differences between Windows Server 2008 and Windows Server 2012 that interest you the most. Be sure to provide a clear and thorough description for each of the five areas th..

  How much cylinder skew is needed for an oceangate disk

How much cylinder skew is needed for an oceangate disk operating at 20,000 rpm(new series for the christmas promotions) which has a seek time of 0.5 milliseconds? This disk has 800 sectors of 512 bytes each on each track?

  Difference from a firewall to border security

Discuss why is it important for a firm to have firewalls and border security in place? I know that a firewall is to stop intruders from entering your network but when read on it seems border security is very similar.

  Explaining the type of firewall

Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?

  Discuss the different dynamic storage allocation algorithms

Prepare a presentation where you discuss the different dynamic storage allocation algorithms, First-fit, Best-fit, and Worst-fit. Include the pros and cons of each algorithm?

  Determine the number of hits and misses

Assuming the following memory accesses on a Direct Mapped cache unit which is defined by a 2-bit offset, index, and tag. Determine the number of hits and misses for the following sequence of memory addresses: 27, 15, 60, 43, 11, 48, 54, 15, 43, 22

  Explain the function of input controls

Explain the function of input controls and identify four types of input control and explain the function of each

  Discuss mitigation strategies

It is determined that 3-out of 5-businesses that experience downtime of forty-eight hours or more will be out of business within three years.

  Explain basic network security concepts

Explain an example of the Public Key Infrastructure that would describe the differing usages of symmetric and asymmetric encryption and how these encryption technique might use either a substitution or a transposition cipher.

  A typist is entering text on a keyboard

A typist is entering text on a keyboard at the rate of 30 words per minute. If each word is 6 characters long on average, how many bits per second are being sent to main memory? A space is also a character. Assume that each word is followed by one sp..

  Autonomous intelligent software agents are used in

autonomous intelligent software agents are used in artificial intelligence to solve an increasing number of complex

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd