Answer:
I would suggest an outdated laptop that can't be updated anymore because it is old and outdated.
Explanation:
If you hack on an old laptop it can't be traced back to you because the servers are shutdown.
The first thing we are going to do is find the equation of motion:
ωf = ωi + αt
θ = ωi*t + 1/2αt^2
Where:
ωf = final angular velocity
ωi = initial angular velocity
α = Angular acceleration
θ = Revolutions.
t = time.
We have then:
ωf = (7200) * ((2 * pi) / 60) = 753.60 rad / s
ωi = 0
α = 190 rad / s2
Clearing t:
753.60 = 0 + 190*t
t = 753.60 / 190
t = 3.97 s
Then, replacing the time:
θ1 = 0 + (1/2) * (190) * (3.97) ^ 2
θ1 = 1494.51 rad
For (10-3.97) s:
θ2 = ωf * t
θ2 = (753.60 rad / s) * (10-3.97) s
θ2 = 4544,208 rad
Number of final revolutions:
θ1 + θ2 = (1494.51 rad + 4544.208 rad) * (180 / π)
θ1 + θ2 = 961.57 rev
Answer:
the disk has made 961.57 rev 10.0 s after it starts up
Answer: (C) Response controls
Explanation:
According to the given question, the response control is not the necessary element while handling the users or customer data as compared to all the other given options that is individual participation, data minimization and the purpose specification.
- The response control is basically used for exchange the data or any information in an organization but the main disadvantage is that they share all the response and information as they not wait for the request from the users.
- The all the three other given options expect response control are the important element for handling the customer data as it helps in maintaining the Personal information.
Therefore, Option (C) is correct answer.