Answer:
I 10 u v 2 because its all equal to the squares. Sorry I dont know if this is correct but I did try to calculate it :)
Explanation:
Answer:
I am pretty confident it is the Employer!
Explanation:
They have the responsibility to provide a safe workplace that is free from serious hazards, according to the General Duty Clause of the OSH Act (OSHA Standards)
I hope this helped you!! :D
Answer: (B) 100
Explanation:
Given that;
Pstatic = 20 psig , hz = 160ft, hf = 20ft
Now total head will be;
T.h = hz + hf
T.h= 160 + 20
T.h = 180ft
Minimum pressure = Psatic + egh
we know that specific weight of water is 62.4 (lb/ft3)
so
P.min = (20 bf/in² ) + (62.4 b/ft³ × 180 fr
P.min = (20 bf/in² ) + ( 62.4 × 180 × 1 ft²/144 in²)
P.min = 20 + 78
P.min = 98 lbf/in²
Therefore the minimum pressure rating (psi) of the piping system is most nearly B) 100
Answer:
Length of beam = 10in
Explanation:
We first calculate the maximum shear force.
Calculating for V, we have:
V = 3200Ib
P = 3200 *2
P = 6.4k
Let's now use the equation for the load for a length.
Using the stress equation,
Inputting figures in the equation, we have:
Solving for L, we have:
L = 10in
Length of beam will = 10in
1. Integrity
Integrity involves assurance that all information systems are protected and not tampered with. IA aims to maintain integrity through means such as anti-virus software on all computer system, and ensuring all staff with access to know how to appropriately use their systems to minimize malware, or viruses entering information systems.
IT Governance provides a variety of E-learning courses to improve staff awareness on topics such as phishing and ransomware, as a means to reduce the likelihood of system being breached, and data exposed.
2. Availability
Availability simply means those who need access to information, are allowed to access it. Information should be available to only those who are aware of the risks associated with information systems.
3. Authentication
Authentication involves ensuring those who have access to information, are who they say they are. Ways of improving authentication involve methods such as two-factor authentication, strong passwords, bio-metrics and other devices. Authentication may also be used to not only identify users, but also other devices.
4. Confidentiality
IA involves the confidentiality of information, meaning only those with authorization may view certain data. This step is closely mirrored by the six data processing principles of the General Data Protection Regulation (GDPR), where by personal data must be processed in a secure manner "using appropriate technical and oganizational measures" ("integrity and confidentiality").
5. Nonrepudiation
The final pillar simply means someone with access to your organizations information system cannot deny having completed an action within the system, as there should be methods in place to prove that they did make said action.