Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1

The performance of a file system depends on the cache hit rate (fraction of blocks found in the cache). If it takes 1 msec to satisfy a request from cache, however 40 msec to satisfy a request if a disk read is needed, provide a formula for mean time required to satisfy a request if the hit rate is h. Plot this function for values of h changing from 0 to 1.0.

problem 2

A UNIX file system has 1-KB blocks and 4-byte disk addresses. What is maximum file size if i-nodes hold 10 direct entries, and one single, triple, and double indirect entry each?

problem 3

How many disk operations are needed to fetch i-node for the file /usr/ast/courses/os/handout.t? Suppose that i-node for the root directory is in memory, but nothing else along the path is in memory. Also suppose that all directories fit in one disk block.

problem 4

Illustrate when you run unlink () operation to remove a file on ext3 file system. Be specific about what disk blocks have to be written where in what order. Describe your assumptions.

problem 5

The ext3 fsck program recovers a crashed ext3 file system through scanning the journal of this file system and replaying each record in journal. The ext3 fsck program also clears the journal to save space for new journal records. Is there a strict order between the two steps? Why or why not?

problem 6

In the software v.s. hardware virtualization paper, the author discussed the problem with popfl in Section 4.4. What exactly is the problem?

problem 7

As the number of cores keeps rising, the probability that some cores fail at any given moment also raises. What are the implications of this trend on Barrelfish?

problem 8

prepare pseudo code to execute the pthread_create wrapper of the Tern memoizer. Note you need to describe your data structure for maintaining deterministic thread IDs. In addition, think of what might go wrong when the child thread calls self().

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91503

Have any Question? 

Related Questions in Computer Engineering

Please let us access free resources to try at our institute

Please let us access free resources to try at our institute Jubail Technical Institute ( If it is approved by higher managment later, we can have deal or an agreement with you for further course of action ...

One of your customers is delinquent on his accounts payable

One of your customers is delinquent on his accounts payable balance. You've mutually agreed to a repayment schedule of $596 per month . You will charge 1.2 % per month interest on the overdue balance. If the current bala ...

Examine the subscription form shown in figure 5-53 using

Examine the subscription form shown in Figure 5-53. Using the structure of this form, do the following: A. Create a model with one entity. Specify the identifier and attributes. B. Create a model with two entities, one f ...

Explain marx karls bourgeoisproletarian distinctions and

Explain marx Karl's bourgeois/proletarian distinctions and why proletarian ends can be attained only by the forcible overthrow of existing social and economic conditions.

When you design a system how its data is stored optimized

When you design a system, how its data is stored, optimized, and accessed are among your primary concerns. If your system cannot work efficiently with well-structured data, then your design would not be of much use to yo ...

A what is a data repository a passive data repository an

a. What is a data repository? A passive data repository? An active data repository? b. Explain why a data repository is important. What is likely to happen if one is not available? c. Define distributed database. d. Expl ...

Answer the following questions briefly1 explain how media

Answer the following questions briefly: 1. Explain how media recovery is handled in ARIES. 2. What are the pros and cons of using fuzzy dumps for media recovery? 3. What are the similarities and differences between check ...

The tftp specification rfc 1350 states that the transfer

The TFTP specification (RFC 1350) states that the transfer identifiers (TIDs) chosen for a connection should be randomly chosen, so that the probability that the same number is chosen twice in immediate succession is ver ...

What are the d-functions in excel and how to do nested

What are the D-functions in excel, and how to do nested d-functions?

Create a view of computer named computer view that displays

Create a view of COMPUTER named Computer View that displays Serial Number together with Make and Model as one attribute named Computer Type. Place a colon and a space between Make and Model in the format: Dell: OptiPlex ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate