1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
3 years ago
15

Select the correct answer.

Engineering
2 answers:
Lilit [14]3 years ago
8 0

Answer:

D

Explanation:

Confidential data is not supposed to be shared amongst others.

geniusboy [140]3 years ago
5 0

Answer:

D.

Explanation:

Revealing confidential data is illegal first of all. And second business isn't allowed to share info due to the confidentiality law.  All the others aren't unethical, they are just precautions for the safety of other employees.

You might be interested in
Các đặc điểm chính của đường dây dài siêu cao áp .
rodikova [14]

Answer:

Đường dây siêu cao áp 500kV: Những chuyện giờ mới kể ... ​Ngày 27/5/1994, hệ thống đường dây điện siêu cao áp 500kV Bắc - Nam chính thức đưa ... Tại thời điểm đó, các nước như Pháp, Úc, Mỹ khi xây dựng đường dây dài nhất ... và chế ra các máy kéo dây theo đặc thù công việc của từng đơn vị.

Explanation:

8 0
3 years ago
What type of companies would employ in mechanics engineering​
Alex73 [517]
What do y’all do when ya girl go eat lunch and eat it and eat
3 0
3 years ago
What does the supply chain management process involve
VMariaS [17]

Answer:

It involves the active streamlining of a business's supply-side activities to maximize customer value and gain a competitive advantage in the marketplace

Explanation:

Supply chain management is the management of the flow of goods and services and includes all processes that transform raw materials into final products.

5 0
3 years ago
CS3733: Homework/Practice 05 Suppose we would like to write a program called monitor which allows two other programs to communic
valina [46]

Answer:

#include<stdio.h>

#include<stdlib.h>

#include<unistd.h>

#include<sys/types.h>

#include<string.h>

#include<pthread.h>

//#include<sys/wait.h>

int main(int argc, char** argv)

{

int fd1[2];

int fd2[2];

int fd3[2];

int fd4[2];

char message[] = "abcd";

char input_str[100];

pid_t p,q;

if (pipe(fd1)==-1)

{

 fprintf(stderr, "Pipe Failed" );

 return 1;

}

if (pipe(fd2)==-1)

{

 fprintf(stderr, "Pipe Failed" );

 return 1;

}

if (pipe(fd3)==-1)

{

 fprintf(stderr, "Pipe Failed" );

 return 1;

}

if (pipe(fd4)==-1)

{

 fprintf(stderr, "Pipe Failed" );

 return 1;

}

p = fork();

if (p < 0)

{

 fprintf(stderr, "fork Failed" );

return 1;

}

// child process-1

else if (p == 0)

{

 close(fd1[0]);// Close reading end of first pipe

 char concat_str[100];

 printf("\n\tEnter meaaage:"):

 scanf("%s",concat_str);

 write(fd1[1], concat_str, strlen(concat_str)+1);

 // Concatenate a fixed string with it

 int k = strlen(concat_str);

 int i;

 for (i=0; i<strlen(fixed_str); i++)

 {

  concat_str[k++] = fixed_str[i];

 }

 concat_str[k] = '\0';//string ends with '\0'

 // Close both writting ends

 close(fd1[1]);

 wait(NULL);

//.......................................................................

 close(fd2[1]);

 read(fd2[0], concat_str, 100);

 if(strcmp(concat_str,"invalid")==0)

 {

 printf("\n\tmessage not send");

 }

 else

 {

  printf("\n\tmessage send to prog_2(child_2).");

 }

 close(fd2[0]);//close reading end of pipe 2

 exit(0);

}

else

{

 close(fd1[1]);//Close writting end of first pipe

 char concat_str[100];

 read(fd1[0], concal_str, strlen(concat_str)+1);

 close(fd1[0]);

 close(fd2[0]);//Close writing end of second pipe

 if(/*check if msg is valid or not*/)

 {

  //if not then

  write(fd2[1], "invalid",sizeof(concat_str));

  return 0;

 }

 else

 {

  //if yes then

  write(fd2[1], "valid",sizeof(concat_str));

  close(fd2[1]);

  q=fork();//create chile process 2

  if(q>0)

  {

   close(fd3[0]);/*close read head offd3[] */

   write(fd3[1],concat_str,sizeof(concat_str);//write message by monitor(main process) using fd3[1]

   close(fd3[1]);

   wait(NULL);//wait till child_process_2 send ACK

   //...........................................................

   close(fd4[1]);

   read(fd4[0],concat_str,100);

   close(fd4[0]);

   if(sctcmp(concat_str,"ack")==0)

   {

    printf("Messageof child process_1 is received by child process_2");

   }

   else

   {

    printf("Messageof child process_1 is not received by child process_2");

   }

  }

  else

  {

   if(p<0)

   {

    printf("Chiile_Procrss_2 not cheated");

   }

   else

   {

     

    close(fd3[1]);//Close writing end of first pipe

    char concat_str[100];

    read(fd3[0], concal_str, strlen(concat_str)+1);

    close(fd3[0]);

    close(fd4[0]);//Close writing end of second pipe

    write(fd4[1], "ack",sizeof(concat_str));

     

   }

  }

 }

 close(fd2[1]);

}

}

8 0
3 years ago
A structural component in the form of a wide plate is to be fabricated from a steel alloy that has a plane-strain fracture tough
jeyben [28]

Complete question:

A structural component in the form of a wide plate is to be fabricated from a steel alloy that has a plane strain fracture toughness of 98.9 MPa root m (90 ksi root in.) and a yield strength of 860 MPa (125,000 psi). The flaw size resolution limit of the flaw detection apparatus is 3.0 mm (0.12 in.). If the design stress is one-half of the yield strength and the value of Y is 1.0, determine whether or not a critical flaw for this plate is subject to detection.

Answer:

Since the flaw 17mm is greater than 3 mm the critical flaw for this plate is subject to detection

so that critical flow is subject to detection  

Explanation:

We are given:

Plane strain fracture toughness K = 98.9 MPa \sqrt{m}

Yield strength Y = 860 MPa

Flaw detection apparatus = 3.0mm (12in)

y = 1.0

Let's use the expression:

oc = \frac{K}{Y \sqrt{pi * a}}

We already know

K= design

a = length of surface creak

Since we are to find the length of surface creak, we will make "a" subject of the formula in the expression above.

Therefore

a= \frac{1}{pi} * [\frac{k}{y*a}]^2

Substituting figures in the expression above, we have:

= \frac{1}{pi} * [\frac{98.9 MPa \sqrt{m}} {10 * \frac{860MPa}{2}}]^2

= 0.0168 m

= 17mm

Therefore, since the flaw 17mm > 3 mm the critical flow is subject to detection  

3 0
3 years ago
Read 2 more answers
Other questions:
  • Three return steam lines in a chemical processing plan enter a collection tank operating at a steady state at 1 bar. Steam enter
    11·1 answer
  • First step in solving frames in to solve support reactions when looking at the frame as a whole. a)- True b)-False
    9·1 answer
  • Write a method called compFloat5 which accepts as input two doubles as an argument (parameter). Write the appropriate code to te
    9·1 answer
  • The working section of a transonic wind tunnel has a cross-sectional area 0.5 m2. Upstream, where the cross-section area is 2 m2
    10·1 answer
  • The shear force diagram is always the slope of the bending moment diagram. a)True b)- False
    14·1 answer
  • The coefficient of performance of a reversible refrigeration cycle is always (a) greater than, (b) less than, (c) equal to the c
    12·1 answer
  • When could you use the engineering design process in your own life?
    9·1 answer
  • Write the 5 important of profession education in a point​
    10·1 answer
  • 1. Band saw lower wheel does not require a guard *
    6·1 answer
  • Javier’s class visited a power plant near his city, and they learned how it produced electricity. What does this form of power d
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!