Question

Suppose you have a 100GB database housed on a disk array that supports a transfer rate of 60MBps and a tape drive that supports 200GB cartridges with a transfer rate of 80MBps. How long will it take to back up the database? What is the transfer time if 2:1 compression is possible?

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Engineering

Operating Systems

Related Computer Engineering Q&A

Find answers to questions asked by students like you.

Q: Select all of the registers listed below that are changed during DECODE INSTRUCTION step of an LC-3 ...

A: LC3 is an assembly language with simple instruction sets but can be used to write complex programs.

Q: you will create a program that will simulate an exam prep tool for simple addition.

A: The program is written in c++

Q: Which of the following is the correct check digit for the ISBN. Relativity: The Special and General ...

A: Actually, the answer has given below:

Q: Which relational algebra operators can be applied to a pair of tables that are not union-compatible?...

A: Relational algebra operators: The relational algebra operators that can be applied to a pair of tabl...

Q: Compare and contrast the ideas of virtual memory and virtual machines. How do the goals of each comp...

A: Definition-based comparison The virtual memory / virtual memory aims to demonstrate the entire machi...

Q: the interconnection between a DTE and DCE using a 25 pin RS-232cable and the pin connection between ...

A: In ordinary terms , handshaking takes after setting up correspondence or an inviting connection betw...

Q: using python code determine the coeffcients of polynomial y=a0+a1x+a2x2+a3x3 that passes through the...

A: The code is written in python to find the coefficients We can take the first point (0,10) then the e...

Q: You are an ISP that is responsible for allocating addresses to different suburbs that has 60 compute...

A:   Given network address is 184.222.0.0  a. CIDR for this network Here allocating addresses to differ...

Q: Which culture embraced the term “GNU” (GNU’s Not UNIX) and laid the free softwaregroundwork for Linu...

A: Hacker culture and GNU: Richard Stallman is a well-known hacker and he defines hacker as the person...

Q: Write the following code segment in MARIE assembly ianguage. (Hint: Turn the for loop into a while l...

A: Explanation: From the below code, the hexadecimal address is mentioned for line number in program b...

Q: Suppose we want an error-correcting code that will allow all single-bit errors to be corrected for m...

A: a. The number of parity bits: The length of the memory word is 12. The number of parity bits for mem...

Q: Implement the inordermethod in BST using a stack instead of recursion. Write a test program thatprom...

A: Program: //import statement import java.util.Scanner; import java.util.Collection; //class Test publ...

Q: Microkernels attempt to provide as small a kernel as possible, putting much of the operating system ...

A: A microkernel is designed as a software tool with a minimum number of methods and data. It mainly he...

Q: What is the difference between a microcontroller and a system-ona-chip?

A: Difference between microcontroller and a system-on-chip: The differences between microcontroller an...

Q: Your company has acquired Joggers PLC, a smaller company. The integration of the information systems...

A: Information system is a coordinated arrangement of segments for gathering, putting away, and handlin...

Q: Alice uses RSA to send a key to Bob for use in encryption of future messages. The key is the word "C...

A: RSA calculation is deviated cryptography calculation. Deviation here implies that it chips away at t...

Q: How can you specify a text pattern that must be at the beginning of a line of text usinga regular ex...

A: Regular expression: Regular expression in Linux is also known as regex or regexp. It is known to b...

Q: Define a function in loop_functions.py named count_collatz that takes a single paramater named a_0. ...

A: Hailstone Sequence: It is the sequence that calculates the number that may get increased or decreas...

Q: Apply Bresenham’s Line Drawing algorithm to find the points of the line between the end points, (2,5...

A: # function for line generation def bresenham(x1,y1,x2, y2):   m_new = 2 * (y2 - y1) slope_error_new ...

Q: What is the most common representation used in mostcomputers to store signed integer values and why?

A: The most common representation used by the computers to store the signed integer values is the two’s...

Q: Connecting Patient Monitoring Devices to EHRs An electronic health record (EHR) is a computer-readab...

A: Electronic Health Record (EHR): An EHR is a computer-readable record that contains health-related i...

Q: Create a program that gives the user to display the sum of the first andsecond numbers, difference o...

A: Since the programming language is not mentioned therefore writing code in Python language.   print (...

Q: hat is the difference between a subsystem and a logical partition?

A: Difference between a subsystem and a logical partition: Some of the difference between a subsystem a...

Q: Computer Engineering Question

A: Click to see the answer

Q: Define radio frequency identification (RFID) and near field communication (NFC) and explain the chal...

A: Radio frequency identification (RFID) and near field communication (NFC) RFID is a wireless communi...

Q: . Suppose we have 2 bytes of virtual memory and 28 bytes of physical main memory. Suppose the page s...

A: Given, Size of virtual memory = 210 bytes Size of Physical main memory = 28bytes Page size =  24 byt...

Q: How is LOOK different from SCAN?

A: Difference between LOOK and SCAN: The SCAN algorithm differs from the LOOK algorithm in the followin...

Q: Which of the following commands can be used on a Fedora 20 system to view hardwareand service startu...

A: "journalctl” command: The modern Linux operating such as a Fedora 20 system uses "journalctl" comm...

Q: Which of the following lines of code finds the number of characters in String list and assigns the v...

A: Program: //Defining class class Main {     //Defining main   public static void main(String[] args) ...

Q: What are the basic integration challenges in deployment of IoT devices? Explain Virtualization-based...

A: The list of ten essential challenges faced by organizations that trigger quality problems, resulting...

Q: (PHP) Find errors in the following code and correct them. <?php$number = "13 students’;$extra = 5...

A: Explanation: The given program computes the addition of given two values “$number” and “$extra”. Th...

Q: You know a Linux command will perform a desired function for you, but you cannotremember the full na...

A: Linux manual: Linux contains huge number of commands that are used to perform specific task. But i...

Q: Define a new class named UnweightedGraphFindCycle thatextends UnweightedGraph with a new method for ...

A: Program: Exercise.java: //import the required packages import java.util.List; import java.util.Array...

Q: Write a convertToMetric class that has the following field: standard - holds a double, standard len...

A: Actually, the code has given below:

Q: 1. Determine the equation of the line through the given point (a) parallel and (b) perpendicular to ...

A: As per Bartleby guideline: “Since you have posted a question with multiple sub-parts, we will solve ...

Q: Discuss the following: Batch Processing System Strengths and weaknesses of the batch processing sy...

A: Batch Processing System: Batch processing is the processing of group or batch transactions. When bat...

Q: How many 16-byte cache blocks are needed to store all 32-bit matrix elements being referenced?

A: The cache holds information bound for RAM, yet it is quicker than RAM. For effortlessness, we accept...

Q: (Please help me. I request not to copy from anywhere.all answers are wrong.do please.thanks)

A: Registers are brief stockpiling areas inside the CPU that hold information and addresses. Its docume...

Q: Discuss IPv6, along with how it differs from IPv4.

A: IPv6 Internet Protocol Version 6 (IPv6) is a network layer protocol that enables a data communicatio...

Q: Explain the concept of locality of reference, and state its importance to memory systems.

A: Locality of reference: It is a property where the data and instructions are accessed in a bunch by a...

Q: Suppose Client A initiates a Telnet session with Server S. At about the same time, Client Balso init...

A: Given scenario: From the given scenario “Client A” initiates a Telnet session with Server “S” and a...

Q: Make a C++ grading program for a class with the following grading policies: a. There are two quizzes...

A: The program is written in c++.

Q: Describe write-through and write-back cache modification as they are used in shared memory systems, ...

A: A processor tries to write a word checks the address for the presence of cache and will Hit. Here  w...