subject

Assume one file has r =106 records. each record takes r = 100 bytes, of which 10 bytes are for the key of the record. suppose the key values range from 1 through 1,000,000, inclusive. assume the block size b is 1000 bytes for all files, and that an address (block pointer, tree node pointer, or data record pointer) takes 10 bytes.
3. multilevel index: (15 points)
i. what is the fan-out value if multi-level index is used?
j. how many levels are there so that top level index fits on a single block in multilevel index?
k. how many block accesses are needed to fetch a record by using multilevel index?
l. what is the key value of the 4th index record on the top level, assuming each index record points to the record with the highest key value in a block of the next level down?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 02:00
For a typical middle-income family, what is the estimated cost of raising a child to the age of 18? $145,500 $245,340 $304,340 $455,500
Answers: 1
question
Computers and Technology, 23.06.2019 21:20
In microsoft word, when you highlight existing text you want to replace, you're in              a.  advanced mode.    b.  automatic mode.    c.  basic mode.    d.  typeover mode
Answers: 1
question
Computers and Technology, 24.06.2019 16:30
What is the item which could be matched with a statement below? software installed on a computer that produces pop-up ads using your browser an example of social engineering malware loads itself before the os boot is complete type of spyware that tracks your keystrokes, including passwords windows key + l the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer when someone who is unauthorized follows the employee through a secured entrance to a room or building a type of malware that tricks you into opening it by substituting itself for a legitimate program a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Answers: 1
question
Computers and Technology, 24.06.2019 20:20
3. write assignment statements that perform the following operations with the variables a, b, and c: a. adds 2 to a and assigns the result to b b. multiplies b times 4 and assigns the result to a c. divides a by 3.14 and assigns the result to b
Answers: 2
You know the right answer?
Assume one file has r =106 records. each record takes r = 100 bytes, of which 10 bytes are for the k...
Questions
question
Business, 10.03.2020 01:40
question
Mathematics, 10.03.2020 01:40
Questions on the website: 13722359