1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
13

Who is???????????????????

Engineering
1 answer:
aleksley [76]3 years ago
8 0
Woah that’s pretty cool! Did you draw/make that?!
You might be interested in
When you first start a car after it has been sitting for more than an hour, it pollutes up to ......times more than when the eng
lesya [120]
20 time more then when it’s warm
6 0
4 years ago
Read 2 more answers
A piston–cylinder assembly contains 5 kg of air, initially at 2.0 bar, 30 C. The air undergoes a process to a state where the pr
Ainat [17]

Answer: wor done is 145. 06kJ

Heat transfer is 135.53kJ

Explanation:

No of moles of air = mass/molar mass = 5000g/28gmol^-1 = 172.65mol

P1 = 2bar =2*101300 =202600pa

T1 = 30° +273k = 303k

P2 =p1 = 202600pa

V2 =? T2 =?

Using pV = nRT

R = 8.314 PA m^3 mol^-1 k^-1

V1 = (172.65*8.314*303)/202600

V1 = 2.146m^3

For second state, 1.5pv = const = P1V1

V2 = (202600*2.146)/(1.5*202600)

V2 = 1.43m^3

Volume change = 2.146 - 1.43 =0.715m^3

Word done = pressure* volume change

W = 202600*0.716 = 145061.6J

= 145.061kJ

Using V1/T1 = V2/T2

T2 = V2T1/V1

=(1.43*303)/2.146 = 201.9k

For internal energy U

U = nCv*(T2 - T1)

*CV is the heat capacity at const. vol approximately 0.718J mol^-1 k^-1

U = 172.65*0.718*(201.9-303)

U = -12532.6J = -12.532kJ

The -ve means the system lost internal energy.

Q = U+W = total heat energy of system

Q = - 12.532+145.061 = 132.52 kJ

7 0
4 years ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
What is the flow of a charge called​
alexira [117]

Answer:

The flow of a charge is called​ electric current.

Explanation:

8 0
3 years ago
A car accelerates from rest with an acceleration of 5 m/s^2. The acceleration decreases linearly with time to zero in 15 s, afte
Tpy6a [65]

Answer: At time 18.33 seconds it will have moved 500 meters.

Explanation:

Since the acceleration of the car is a linear function of time it can be written as a function of time as

a(t)=5(1-\frac{t}{15})

a=\frac{d^{2}x}{dt^{2}}\\\\\therefore \frac{d^{2}x}{dt^{2}}=5(1-\frac{t}{15})

Integrating both sides we get

\int \frac{d^{2}x}{dt^{2}}dt=\int 5(1-\frac{t}{15})dt\\\\\frac{dx}{dt}=v=5t-\frac{5t^{2}}{30}+c

Now since car starts from rest thus at time t = 0 ; v=0 thus c=0

again integrating with respect to time we get

\int \frac{dx}{dt}dt=\int (5t-\frac{5t^{2}}{30})dt\\\\x(t)=\frac{5t^{2}}{2}-\frac{5t^{3}}{90}+D

Now let us assume that car starts from origin thus D=0

thus in the first 15 seconds it covers a distance of

x(15)=2.5\times 15^{2}-\farc{15^{3}}{18}=375m

Thus the remaining 125 meters will be covered with a constant speed of

v(15)=5\times 15-\frac{15^{2}}{6}=37.5m/s

in time equalling t_{2}=\frac{125}{37.5}=3.33seconds

Thus the total time it requires equals 15+3.33 seconds

t=18.33 seconds

3 0
3 years ago
Other questions:
  • A 25-W compact fluorescent lightbulb (CFL) produces the light equivalent of a 100-W incandescent bulb. The population of North A
    14·1 answer
  • An escalator with 35° incline is designed to have two passengers per step. Find number of persons moved per hour for the design
    13·1 answer
  • The Energy Losses Associated with Valves and Fittings: a)- are generally associated with a K factor b)- are generally associated
    10·1 answer
  • we wish to send at a rate of 10Mbits/s over a passband channel. Assuming that an excess bandwidth of 50% is used, how much bandw
    15·1 answer
  • A cylindrical metal specimen having an original diameter of 12.8 mm (0.505 in.) and gauge length of 50.80 mm (2.000 in.) is pull
    9·1 answer
  • Air at 200 kPa, 528C, and a velocity of 355 m/s enters an insulated duct of varying cross-sectional area. The air exits at 100 k
    13·1 answer
  • A three-phase transformer connection has a delta-connected secondary, and one of the transformers has been center-tapped to form
    10·1 answer
  • Imagine that you are the architect that designed the school. Identify five safety hazards that should be included in the design
    15·1 answer
  • Which list ranks these jobs in the STEM career cluster based on the years of schooling required, from the most to least?
    14·2 answers
  • 1.The HCF of 15 and 20?<br>2.5!=??...????​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!