1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
4 years ago
11

If the mine winch drum diameter is 6M, how far will the counterweight lift for each single rotation of the drum

Computers and Technology
1 answer:
Gennadij [26K]4 years ago
5 0

Answer:

Circumference of drum = 18.86 m

Given:

Diameter of drum = 6 m

Radius of drum = 3 m

Find:

Circumference of drum

Computation:

Circumference of drum is called single rotation

Circumference of drum = 2πr

Circumference of drum = 2[22/7][3]

Circumference of drum = 18.857

Circumference of drum = 18.86 m

You might be interested in
Hardware failure, power outages, and DOS attacks will affect:
const2013 [10]

Answer:

The answer should be data availability

6 0
3 years ago
What is the maximum number of communication paths for a team of twenty people.
Aneli [31]

Answer:

Communication path basically define the path in which the information and messages can be exchange by using the efficient communication path.

There are simple formula for calculating the total number of communication channel that is :

 =\frac{n(n-1)}{2}

Where, n is the number of stack holder.

Now, the maximum number of communication paths for a team of twenty people can be calculated as:

n=20  

=\frac{20(20-1)}{2} = 190

Therefore, 190 is the total number of communication path.

3 0
3 years ago
Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page la
Ipatiy [6.2K]

Answer:

4.01 version .

Explanation:

A hypertext Markup language is used for designing the web page when we added the CSS on the web page we can create the web page more efficient manner and also there is more control over the web page because we can easily call the classes of CSS.

The Hypertext Markup language version 4.01 provides greater flexibility on the web page also We can also control the page layout in a very easy manner. The appearance of the web page is good as compared to version HTML 4

8 0
4 years ago
What is computer hardware / software​
Pavel [41]

Answer: <u>Computer hardware is any physical device used in or with your machine, like for example, a mouse, or a keyboard.</u> Computer software is a collection of programming code installed on your computer's hard drive it can process billions of data and inputs through this.

Hope this helps!

5 0
3 years ago
The main advantage of using the Gray code is:
zzz [600]

Answer:

a) only one digit changes as the number increases.

Explanation:

Let us first understand what does it mean when we say only one digit changes as the number increases using the Reflected Binary code (also called Gray code)

consider the 4 bit representation of Binary coded decimal and RB codes

Decimal | Binary code  | Reflected binary (RB) code

0              0000               0000

1               0001                0001

2              0010                0011

3              0011                 0010

4              0100                0110

5              0101                 0111

As you can see in the case of binary codes, there are more than one digit changes between two consecutive numbers.

But notice that in the case of Gray codes, there is always one digit change between two consecutive numbers.

The problem with the binary codes is that the more digits change there states the greater is the chance of ending up with random transitional values rather than real values which can be incorrect. The RB code solves this problem by only changing one digit at a time.

The RB code is widely used in linear and rotary encoders, error correction and digital logic design.

8 0
3 years ago
Other questions:
  • List and briefly defined categories of security services.
    8·1 answer
  • How to add bullet points in google slides??
    12·2 answers
  • Identify the output, input, and any missing information for the following problem. George wants to find out how much extra he wi
    15·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • RFID tagging is an IoT technology that allows assets to be tracked using electromagnetic fields to automatically identify tagged
    10·1 answer
  • How todraw a status bar​
    9·1 answer
  • What is responsible for what you see on the monitor?
    13·1 answer
  • Why aren't my skullcandy bluetooth headphones connecting to my school chromebook if I turned on both the headphones and the blue
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!