1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
9

Help pls I don’t understand the question.

Engineering
1 answer:
REY [17]3 years ago
3 0

Answer:

I think it's asking what the area is when it says A=

when it says d= it means diameter

so for the first one, I believe the answer would be 28.27

and the second one would be 0.79

You might be interested in
This elementary problem begins to explore propagation delayand transmission delay, two central concepts in data networking. Cons
telo118 [61]

Explanation:

(a)

Here, distance between hosts A and B is m meters and, propagation speed along the link is s meter/sec

Hence, propagation delay, d_{prop} = m/sec (s)

(b)

Here, size of the packet is L bits

And the transmission rate of the link is R bps

Hence, the transmission time of the packet,  d_{trans} = L/R

(c)

As we know, end-to-end delay or total no delay,

\mathrm{d}_{\text {nodal }}=\mathrm{d}_{\text {proc }}+\mathrm{d}_{\text {quar }}+d_{\max }+d_{\text {prop }}

Here,  $\mathrm{d}_{\text {rroc }}$ and $\mathrm{d}_{\text {quat }}$ \\Hence, $\mathrm{d}_{\text {rodal }}=\mathrm{d}_{\text {trass }}+\mathrm{d}_{\text {prop }}$ \\We know, $\mathrm{d}_{\text {trax }}=\mathrm{L} / \mathrm{R}$ sec and $\mathrm{d}_{\text {vapp }}=\mathrm{m} / \mathrm{s}$ sec\text { Hence, } {d_{\text {nodal }}}=\mathrm{L} / \mathrm{R}+\mathrm{m} / \mathrm{s} \text { seconds }

(d)

The expression, time time $t=d_{\text {trans }}$ means the\at time since transmission started is equal to transmission delay.

As we know, transmission delay is the time taken by host to push out the packet.

Hence, at time $t=d_{\text {trans }}$ the last bit of the packet has been pushed out or transmitted.

(e)

If \ d_{prop} >d_{trans}

Then, at time $t=d_{\text {trans }}$ the bit has been transmitted from host A, but to condition (1),  the first bit has not reached B.

(f)

If \ d_{prop}

Then, at time $t=d_{\text {trans }}$, the first bit has reached destination on B

Here,s=2.5 \times 10^{8} \mathrm{sec}

\begin{aligned}&\mathrm{L}=100 \mathrm{Bits} \text { and }\\&\mathrm{R}=28 \mathrm{kbps} \text { or } 28 \times 1000 \mathrm{bps}\end{aligned}

It's given that \ d_{prop} =d_{trans}

Hence,

        \begin{aligned}\ & \frac{L}{R}=\frac{m}{s} \\m &=s \frac{L}{R} \\&=\frac{2.5 \times 10^{8} \times 100}{28 \times 1000} \\&=892.9 \mathrm{km}\end{aligned}

5 0
3 years ago
The largest class of errors in software engineering can be attributed to _______.
Ilya [14]

Answer:

improper imput validation

Explanation:

6 0
2 years ago
Compared to arc welding, which of the following statements are true about<br> gas welding?
UNO [17]

Show than arc welding

4 0
3 years ago
Characteristics of information assurance management work force
hjlf
1. Integrity

Integrity involves assurance that all information systems are protected and not tampered with. IA aims to maintain integrity through means such as anti-virus software on all computer system, and ensuring all staff with access to know how to appropriately use their systems to minimize malware, or viruses entering information systems.

IT Governance provides a variety of E-learning courses to improve staff awareness on topics such as phishing and ransomware, as a means to reduce the likelihood of system being breached, and data exposed.

2. Availability

Availability simply means those who need access to information, are allowed to access it. Information should be available to only those who are aware of the risks associated with information systems.

3. Authentication

Authentication involves ensuring those who have access to information, are who they say they are. Ways of improving authentication involve methods such as two-factor authentication, strong passwords, bio-metrics and other devices. Authentication may also be used to not only identify users, but also other devices.

4. Confidentiality

IA involves the confidentiality of information, meaning only those with authorization may view certain data. This step is closely mirrored by the six data processing principles of the General Data Protection Regulation (GDPR), where by personal data must be processed in a secure manner "using appropriate technical and oganizational measures" ("integrity and confidentiality").

5. Nonrepudiation

The final pillar simply means someone with access to your organizations information system cannot deny having completed an action within the system, as there should be methods in place to prove that they did make said action.
5 0
3 years ago
In a parallel one-dimensional flow in the positive x direction, the velocity varies linearly from zero at y = 0 to 32 m/s at y =
monitta

Answer:

Ψ = 10(y^2) + c

<em><u>y = 1.067m</u></em>

Explanation:

since the flow is one dimensional in positive X direction, the only velocity component is in X, which is denoted by u

while u is a function of y

we find the u in terms of y; u varies linearly wih y

we use similiraty to find the relation

32/1.6 =<em>u/y</em>

<em><u>u = 20y</u></em>

<em><u>Ψ = ∫20ydy</u></em>

<em><u>Ψ = 10(y^2) + c</u></em>

<em><u>(b)</u></em>

<em><u>the flow is half below y = 1.6*(2/3)=1.067 m</u></em>

<em><u>this is because at two third of the height of a triangle lies the centroid of triangle. since the velocity profile forms a right angled triangle , its height is 1.6 m . the flow is halved at y = 1.067m</u></em>

3 0
3 years ago
Other questions:
  • How old must you be to operate a forklift
    10·2 answers
  • What way the Robotics field is going to impact 1. Industry and productivity 2 . Environment 3. Medical field 4. Economics. From
    15·1 answer
  • The products of combustion from burner are routed to an industrial application through a thin-walled metallic duct of diameter D
    6·1 answer
  • The amount of time an activity can be delayed and yet not delay the project is termed:_________
    14·1 answer
  • A device that helps increase field worker productivity by providing reliable location and time
    13·1 answer
  • When under a deep vacuum the motor winding of a hermetic refrigeration compressor: ______.
    12·1 answer
  • A 5Kw solar system may produce enough energy to power your home. a)-True b)- False
    7·1 answer
  • You have been asked to design a steady state treatment device similar to a continuously mixed reactor to treat toluene in an aqu
    11·1 answer
  • Define the term 'Computer​
    8·2 answers
  • Technician A says that collapsible steering columns may use a pyrotechnic charge. Technician B says that collapsible brake pedal
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!