Answer:
gauge pressure is 133 kPa
Explanation:
given data
initial temperature T1 = 27°C = 300 K
gauge pressure = 300 kPa = 300 × 10³ Pa
atmospheric pressure = 1 atm
final temperature T2 = 77°C = 350 K
to find out
final pressure
solution
we know that gauge pressure is = absolute pressure - atmospheric pressure so
P (gauge ) = 300 × 10³ Pa - 1 ×
Pa
P (gauge ) = 2 ×
Pa
so from idea gas equation
................1
so
P2 = 2.33 ×
Pa
so gauge pressure = absolute pressure - atmospheric pressure
gauge pressure = 2.33 ×
- 1.0 ×
gauge pressure = 1.33 ×
Pa
so gauge pressure is 133 kPa
Answer:
D. Leak-proof
Explanation:
Used oils are required to be stored in closed containers or tanks which will remain closed when oil is not added or removed. Alternatively, used oils can be stored in containers labeled "Used Oil" for regulated hazardous waste storing. A leak-proof container is one that has no drips and dribbles when the container lid is closed. These containers should be kept in good conditions away from rusting, leaks or deteriorations. It is important to mention that used oil should not be stored in anything apart from tanks and leak-proof storage containers.
Answer:
The ratio that a material expands in accordance with changes in temperature is called the coefficient of thermal expansion. Because Fine Ceramics possess low coefficients of thermal expansion, their distortion values, with respect to changes in temperature, are low. The coefficients of thermal expansion depend on the bond strength between the atoms that make up the materials.
Explanation:
:>
Answer / Explanation:
Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.
To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.
On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).