1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
6

A system is composed of four parts, J, K, L, and M. All four must function for the system to function. The four component reliab

ilities are .99, .98, .992, and .998. The designers are considering putting a .80 reliable backup at K. Calculate the change that occurred to the system reliability.
Computers and Technology
1 answer:
dimaraw [331]3 years ago
8 0

Answer:

Change that occurred to the system reliability = 0.016

Explanation:

Overall system reliability consisting of 4 components J/K/L/M is

= Reliability of J x Reliability of K x Reliability of L x Reliability of M

= 0.99 X 0.98 X 0.992 X 0.998

= 0.960

Let the subsystem consisting f K along with its back up is Called K1

Thus ,

Reliability of K1 = 1- ( 1 – Reliability of K) x ( 1 – Reliability of Backup )

                             = 1 – ( 1 – 0.98) x ( 1 – 0.80)

                              = 1 – 0.02 x 0.2

                               = 1 – 0.004

                                = 0.996

Thus revised System reliability

= Reliability of J x Reliability of K1 x Reliability of L x Reliability M

= 0.99 X 0.996 X 0.992 X 0.998

= 0.976

Thus, Revised system reliability = 0.976

Thus change in system reliability

= Revised System reliability – Initial system reliability

= 0.976 – 0.960

= 0.016

You might be interested in
WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
Andrews [41]

Answer:

python is probably the best is you are a begginer

java and C++ are good too

6 0
2 years ago
Plz..... Add the following Binary numbers 1. 111000 + 1100 + 111111​
Korvikt [17]

Answer:

11000011

Explanation:

This is because of the rules of bas 2

3 0
2 years ago
What will be the results of executing the following statements? x.setEditable(true); x.setText("Tiny Tim"); a. The text field x
maxonik [38]

Answer:

Option B: The text field x will have the value "Tiny Tim" and the user will be able to change its value.

Explanation:

  • The first statement say:  x.setEditable(true);

It will only change the property of the text present in x to editable. This means that whenever the text value needs to change the user can edit it.

  • The second statement say:   x.setText("Tiny Tim");

It will put the text "Tiny Tim" into the attribute x and present it as the output or result.

6 0
3 years ago
Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
xeze [42]
<span>Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.
</span>

SecNet 11 Plus is a family of encrypted <span>802.11b wi-fi <span>networking products. The Army has also approved</span></span> SecNet 11<span> as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.</span>

7 0
2 years ago
Which option will Joan use to get a glimpse of how her presentation will look when she presents it to her audience? Joan will us
Murrr4er [49]

Since Joan wants to see what her presentation would look like in the eyes of her audience, it might be best for her to use the Slideshow view that is available at the bottom right side of her desktop view.

This option is a full-screen form of her Normal view in Microsoft PowerPoint. The Slideshow view is represented by the projector screen symbol next to the zoom in and out bar.

7 0
2 years ago
Read 2 more answers
Other questions:
  • A peripheral can be used to tell a computer to complete a specific task. True False
    15·1 answer
  • whats something that u want to do but ur parents wont allow it like having a phone or going to a college ​
    11·2 answers
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
    6·1 answer
  • Assuming that we only support BEQ and ADD instructions, discuss how changes in the given latency of this resource affect the cyc
    7·1 answer
  • A ________ is a powerful analytical tool to size up Apple Inc.'s competitive assets in order to determine whether or not those a
    9·1 answer
  • Write a program to read 10 integers from an input file and output the average, minimum, and maximum of those numbers to an outpu
    14·1 answer
  • What if you accidentally delete your browser history
    7·1 answer
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
  • In Windows, what does the device manager tell you?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!