Answer:
public class Person {
//fields
private int id;
private String name;
private Payment pay;
//constructor
public Person(String name, int id,
int startSal, int startBon){
this.name = name;
this.id = id;
this.pay = new Payment(startSal, startBon);
}
//method get name
public String getName(){
return name;
}
//method get id
public int getId(){
return id;
}
//method get start salary
public int getStartSalary(){
return pay.startSalary;
}
//method get start bonus
public int getStartBonus(){
return pay.startBonus;
}
//inner payment class
private class Payment{
int startSalary;
int startBonus;
public Payment(int sal, int bon){
this.startSalary = sal;
this.startBonus = bon;
The first thing we are going to do is find the equation of motion:
ωf = ωi + αt
θ = ωi*t + 1/2αt^2
Where:
ωf = final angular velocity
ωi = initial angular velocity
α = Angular acceleration
θ = Revolutions.
t = time.
We have then:
ωf = (7200) * ((2 * pi) / 60) = 753.60 rad / s
ωi = 0
α = 190 rad / s2
Clearing t:
753.60 = 0 + 190*t
t = 753.60 / 190
t = 3.97 s
Then, replacing the time:
θ1 = 0 + (1/2) * (190) * (3.97) ^ 2
θ1 = 1494.51 rad
For (10-3.97) s:
θ2 = ωf * t
θ2 = (753.60 rad / s) * (10-3.97) s
θ2 = 4544,208 rad
Number of final revolutions:
θ1 + θ2 = (1494.51 rad + 4544.208 rad) * (180 / π)
θ1 + θ2 = 961.57 rev
Answer:
the disk has made 961.57 rev 10.0 s after it starts up
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.
<span>This is called an unshielded twisted pair cable, which is also known as a UTP cable. This type of cable has four pairs of wires that are twisted around each other. Because the wires are like this, the electrical interference is reduced.</span>