+1-415-315-9853

info@mywordsolution.com

## Computer Science

 Algorithms Design Computer Network & Security Automata & Computation Operating System Computer Architecture Information Technology Internet Programming Software Engineering Data Communication Computer Graphics Compiler Design LINUX/UNIX Data Structure WINDOWS Application Digital Circuit E-Commerce Microprocessor Artificial Intelligence Data Warehouse Cryptography

problem 1

Disk requests come in to disk driver for cylinders 10, 22, 20, 2, 40, 6, and 38, in that order. A seek takes 6 mes per cylinder moved. How much seek time is required for

(a) First-come, first served.

(b) Closest cylinder next.

(c) Elevator algorithm (initially moving upward).

In all cases, the arm is initially at cylinder 20.

problem 2

A slight change of the elevator algorithm for scheduling disk requests is to always scan in the similar direction, In what respect is this modified algorithm better than elevator algorithm?

problem 3

A RAID could fail if two or more of its drives crash within the short time interval. Assume that probability of one drive crashing in a given hour is p. What is the probability of a k-drive RAID failing in a given hour?

problem 4

Consider magnetic disk consisting of 16 heads and 400 cylinders. This disk is divided into four 100-cylinder zones with the cylinders in different zones containing 160, 200, 240, and 280 sectors, respectively. Suppose that each sector contains 512 bytes, average seek time between adjacent cylinders is 1 msec, and disk rotates at 7200 RPM. Compute the (a) disk capacity, (b) optimal track skew, and (c) maximum data transfer rate.

problem 5

Some operating systems give a system call rename to give a file a new name. Is there any difference at all between using this call to rename a file and just copying the file to a new file with the new name, followed by deleting the old one?

problem 6

One way to use contiguous allocation of the disk and not suffer from holes is to compact disk every time a file is removed. As all files are contiguous, copying a file needs a seek and rotational delay to read file, followed by transfer at full speed. Writing file back needs the same work. Suppose a seek time of 5 msec, a rotational delay of 4 msec, a transfer rate of 8 MB/sec, and average file size of 8 KB, (a) how long does it take to read a file into main memory then prepare it back to disk at new location? (b) Using these numbers, how long will it take to compact half of a 16-GB disk? (c) Dose compacting the disk ever make any sense?

problem 7

Free disk space could be kept track of using a free list or a bit map. Disk addresses need D bits. For a disk with B blocks, F of which are free, state condition under which free list uses less space than bitmap. For D having value 16 bits, express your answer as a percentage of the disk space that should be free.

problem 8

What will happen if the bitmap or free list containing information about free disk blocks was totally lost due to a crash? Is there any way to recover from this disaster, or is it bye-bye disk? Discuss your answers for a UNIX and the FAT-16 file system separately.

Operating System, Computer Science

• Category:- Operating System
• Reference No.:- M91954

Have any Question?

## Related Questions in Operating System

### Your objective is to create a program that simulates round

Your objective is to create a program that simulates Round Robin CPU scheduling. You may write your program in C, C++, Java, or Python. If you choose C, C++, or Java you must include a Makefile. Your program will be test ...

### Question what is operating research and its application and

Question: What is operating research and its application and scope of operating research

### One of the most useful tools you will use in your role as

One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist. Essentially, it is a document that serves as a guide to configuring a desktop / system security. Pl ...

### Assignmentin this document of 2-3 pages respond to the

Assignment In this document of 2-3 pages, respond to the following: • Describe the specific security concerns or risks that your chosen operating system is exposed to and how you plan to mitigate the risk that each one p ...

### Unikernelas part of the big picture of kernel design take a

UNIKERNEL As part of the big picture of kernel design, take a look at the attached article. In this course, we have not yet covered some of the OS components that are integral to discussing the benefits and detriments of ...

### Assignment1 arrigo postulated three key propositions of

Assignment (1) Arrigo postulated three key propositions of postmodernism. Explain them in full, using at least 250 words. (2) Daly and Chesney-Lind considered five insights to be distinctive features of feminist theory? ...

### 1 from this book you have learned a little about the

1. From this book, you have learned a little about the different file systems inWindows and Linux. To get a better handle on the differences between them, write a short memo describing three properties of each of these f ...

### Problemnbspdescriptionflash back to flash forward see

Problem  Description: Flash Back to Flash Forward (see Chapter 1 Practice Exercise 1.2 and the OS in DevOps Discussion Area) While having a discussion with your OS DevOps team, you are approached with the situation: our ...

### Linux implementation proposallinx llc has a new research

Linux Implementation Proposal Linx, LLC. has a new research and development group - LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with Linx, LLC.'s M ...

### Firewall rulesin this project you will create two simple

Firewall Rules In this project you will create two simple firewall rules in Windows Advanced Firewall. This may be the first time you have made a modification to the firewall on your computer. The first rule will block a ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro