What is the maximum file size supported by this system

Assignment Help Basic Computer Science
Reference no: EM131211973

Consider the organization of a UNIX file as represented by the inode (Figure 12.14). Assume that there are 12 direct block pointers, and a singly, doubly, and triply indirect pointer in each inode. Further, assume that the system block size and the disk sector size are both 8K. If the disk block pointer is 32 bits, with 8 bits to identify the physical disk and 24 bits to identify the physical block, then

a. What is the maximum file size supported by this system?

b. What is the maximum file system partition supported by this system?

c. Assuming no information other than that the file inode is already in main memory, how many disk accesses are required to access the byte in position 13,423,956?

881_02573e47-98ae-4440-be92-9417cb6ce9aa.png

Reference no: EM131211973

Questions Cloud

Can the system reconstruct the free space list : Suggest a scheme to ensure that the pointer is never lost as a result of a single memory failure.
Address bar of web browser : Someone told me the IP address for Google is 216.58.192.164. Someone else told me it is 216.58.216.163. Try both of these IP addresses in the address bar of your web browser. Who is correct? Explain
Major security breach : Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting in s..
What is the maximum size of a file : In UNIX System V, the length of a block is 1 Kbyte, and each block can hold a total of 256 block addresses. Using the inode scheme, what is the maximum size of a file?
What is the maximum file size supported by this system : Assuming no information other than that the file inode is already in main memory, how many disk accesses are required to access the byte in position 13,423,956?
Gives example of what characteristics fit into each category : The Classification assignment requires you to organize a topic into categories and then provide examples of what characteristics fit into each category.
Pseudo code for an algorithm : Write down pseudo code for an algorithm that sorts the original array in place in time nk log(k).Your algorithm can use a function sort(A, l, r) that sorts the subarray A[l], . . . , A[r].
What are some of the key characteristics of an embedded os : What are some typical requirements or constraints on embedded systems?
Describe and define usability and usability : Describe and define usability and usability best practices in web and mobile design. NOTE: The answer should be between 250 to 350 words and should not contain plagiarism.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the key principles of cyber forensics

Explain the key principles of cyber forensics. Discuss investigation processes used to identify and recover evidence obtained from a computer for evidentiary purposes.

  Developing a strong supply chain management process

Developing a strong Supply Chain Management (SCM) process to match IS system upgrades would provide what advantage(s)? In general, what will this process look like?

  Physical security

As you've learned, physical security doesn't just mean securing systems. It also involves securing the premises, any boundaries, workstations, and other areas of a company. Without physical security, data could be tampered with or stolen, and value i..

  Repeat programming problem 9, but allocate the hash table

Implement the symbol table described in Exercise 5 by reusing the class Tree Dictionary, as described in Section 18.2.2 of this chapter.

  Techniques attacker use to access information on system

Recognize all potential security threats on home personal computer. Recognize some of techniques the attacker might use to access some information on system.

  Compare and contrast of information technology

Compare and contrast of Information Technology and Information Communication and Technology

  Explain the term omniscience

Explain the term omniscience Explain the importance of autonomy in an agent Develop the task environment for an interactive language tutor

  How the tree will shrink and show the final tree

how the tree will shrink and show the final tree.

  Main goals of access control

What are the main goals of access control and what are the best practices recommended to help in achieving them.

  Question regarding the linux system administration

A manager has asked the administrator to change the default background of her machine, which uses XDM. Which file does the administrator need to modify in order to achieve this?

  Create an application predict size of population organisms

Create an application that will predict the approximate size of the population of organisms. The user should select or enter the starting number of organisms in a combo box, enter the average daily population increase(as a percentage) in a text bo..

  Discuss this bible verse and christian worldview

In a minimum of 800 words, discuss this Bible verse and your Christian worldview as they relate to this question. NOTE: To earn better than a minimum grade (B) in grad school, you must go beyond the minimum and it must be considered excellent work..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd