1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
6

A system is composed of four parts, J, K, L, and M. All four must function for the system to function. The four component reliab

ilities are .99, .98, .992, and .998. The designers are considering putting a .80 reliable backup at K. Calculate the change that occurred to the system reliability.
Computers and Technology
1 answer:
dimaraw [331]3 years ago
8 0

Answer:

Change that occurred to the system reliability = 0.016

Explanation:

Overall system reliability consisting of 4 components J/K/L/M is

= Reliability of J x Reliability of K x Reliability of L x Reliability of M

= 0.99 X 0.98 X 0.992 X 0.998

= 0.960

Let the subsystem consisting f K along with its back up is Called K1

Thus ,

Reliability of K1 = 1- ( 1 – Reliability of K) x ( 1 – Reliability of Backup )

                             = 1 – ( 1 – 0.98) x ( 1 – 0.80)

                              = 1 – 0.02 x 0.2

                               = 1 – 0.004

                                = 0.996

Thus revised System reliability

= Reliability of J x Reliability of K1 x Reliability of L x Reliability M

= 0.99 X 0.996 X 0.992 X 0.998

= 0.976

Thus, Revised system reliability = 0.976

Thus change in system reliability

= Revised System reliability – Initial system reliability

= 0.976 – 0.960

= 0.016

You might be interested in
An invisible path determining the way of travel from one place to another.
WARRIOR [948]

Answer:

i dont really like computors

Explanation:

im not good at it

3 0
3 years ago
I recorded a video on my windows PC, but when i tried to play it i got this message:
Anit [1.1K]

Answer:

yes. Look up popular video repair sites and download it (unless its online) but dont just go clicking on random things you dont want to give yourself a virus XD

Explanation:

7 0
2 years ago
Read 2 more answers
If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
lyudmila [28]
If you wish to sign out of your Microsoft account, tap or click file on the ribbon to open the Backstage view and then tap or click the Account tab to <span>display the Account gallery, and tap or click the Sign out link. There are different ways to do that but it is the easiest.</span>
7 0
3 years ago
Write Java program to allow the user to input the amount of deposit, yearly interest rate (percentage), and income tax(percentag
Vedmedyk [2.9K]

Answer:

import java.util.Scanner;

public class num12 {

   public static void main(String[] args) {

       Scanner scr = new Scanner(System.in);

       System.out.println("Enter a Deposit Amount");

       double amt = scr.nextDouble();

       System.out.println("Income tax in percentage");

       double incomeTaxRate = scr.nextDouble()/100;

       System.out.println("Yearly interest rate:");

       double rate = scr.nextDouble();

       double intRate = rate/100;

       double interest = (amt*intRate)-(amt*incomeTaxRate);

       System.out.println("The Interest on "+amt+" at "+rate+"% after one year is "+interest);

   }

}

Explanation:

Find the sample output attached

Java's Scanner class is used to prompt and receive values for deposit amount, income tax rate and interest rate

The yearly interest is calculate by interest = (amt*intRate)-(amt*incomeTaxRate);

3 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
2 years ago
Other questions:
  • Which of the following would be considered a strong password?
    5·2 answers
  • Write a program that allows a user to input words at the command line. Your program should stop accepting words when the user en
    10·1 answer
  • The issue with discovering a perfect solution to a problem is that ________.
    10·2 answers
  • The java compiler requires that a source file use the ________ filename extension question 3 options: 1) .class 2) .h 3) .java
    8·1 answer
  • .<br> 1. Press the _______ key to move to the next cell in a row.
    14·2 answers
  • What is encyclopedia. Com considered to be?
    14·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { int x = 2; int y = 20 int counter = 0;
    8·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x &gt;=
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!