Answer:
metals, composite, ceramics and polymers.
Explanation:
The four categories of engineering materials used in manufacturing are metals, composite, ceramics and polymers.
i) Metals: Metals are solids made up of atoms held by matrix of electrons. They are good conductors of heat and electricity, ductile and strong.
ii) Composite: This is a combination of two or more materials. They have high strength to weight ratio, stiff, low conductivity. E.g are wood, concrete.
iii) Ceramics: They are inorganic, non-metallic crystalline compounds with high hardness and strength as well as poor conductors of electricity and heat.
iv) Polymers: They have low weight and are poor conductors of electricity and heat
Answer:
a) Internal energy
Explanation:
As we know that internal energy is a point function so it did not depends on the path ,it depends at the initial and final states of process.All point function property did not depends on the path.Internal energy is a exact function.
Work and heat is a path function so these depend on the path.They have different values for different path between two states.Work and heat are in exact function.
We know that in ir-reversible process entropy will increase so entropy will be different for reversible and ir-reversible processes.
Answer:
bts biot bts biot jungkukkk
jungkukkkbiot
Explanation:
bts biot bts biot jungkukkk
jungkukkkbiot
Answer:
a) The Net power developed in this air-standard Brayton cycle is 43.8MW
b) The rate of heat addition in the combustor is 84.2MW
c) The thermal efficiency of the cycle is 52%
Explanation:
To solve this cycle we need to determinate the enthalpy of each work point of it. If we consider the cycle starts in 1, the air is compressed until 2, is heated until 3 and go throw the turbine until 4.
Considering this:




Now we can calculate the enthalpy of each work point:
h₁=281.4KJ/Kg
h₂=695.41KJ/Kg
h₃=2105KJ/Kg
h₄=957.14KJ/Kg
The net power developed:

The rate of heat:

The thermal efficiency:

Answer / Explanation:
Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.
To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.
On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).