1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
12

A sheet of steel 1.5 mm thick has nitrogen (N2) atmospheres on both sides at 1200°C and is permitted to achieve steady-state dif

fusion condition. The diffusion coefficient for N2 in steel at this temperature is 6 ´ 10-11 m2 /s, and the diffusion flux is found to be 1.2 ´ 10-7 kg/m2 -s. Also, it is known that the concentration of N2 in the steel at the high-pressure surface is 4 kg/m3 . How far into the sheet from the high-pressure side will the concentration be 2.0 kg/m3 ? Assume a linear concentration profile.
Engineering
1 answer:
Gelneren [198K]3 years ago
3 0

Answer:

do the wam wam

Explanation:

You might be interested in
Which type of engineering design uses an already-existing design?
Arte-miy333 [17]
The answer is D I’m 90% sure
4 0
3 years ago
Read 2 more answers
Show 2 reasons each on how Netflix shows a humane design and an addictive design.
larisa86 [58]

Answer:

Explanation:

1. It is a humane design because of the way it provides people entertainment as well as healing in some situations. Netflix provides entertainment mainly towards realistic situations which also points out the humane design.

2. It is an addictive design because even though the pros of being helpful to certain people it can also be addicting to the mind especially since it is a design where there endless amount of shows you can watch over and over again which that type of action can lead to addiction.

6 0
3 years ago
Identify three operational controls and explain<br> how to use them?
ladessa [460]

Answer:

5.1 Personnel Security. ...

5.2 Physical and Environmental Protection. ...

5.3 Production, Input and Output Controls. ...

5.4 Contingency Planning and Disaster Recovery. ...

5.5 System Configuration Management Controls. ...

5.6 Data Integrity / Validation Controls. ...

5.7 Documentation. ...

5.8 Security Awareness and Training.

8 0
3 years ago
The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix
Tpy6a [65]

Answer:

Explanation:

Note: In case of any queries, just comment in box I would be very happy to assist all your queries

SourceCode:

// MyGUI.java:

// Import packages

import java.awt.FlowLayout;

import java.awt.GridLayout;

import java.awt.event.ActionEvent;

import java.awt.event.ActionListener;

import java.io.BufferedReader;

import java.io.IOException;

import java.io.InputStreamReader;

import java.util.EmptyStackException;

import java.util.Stack;

import javax.swing.JButton;

import javax.swing.JFrame;

import javax.swing.JLabel;

import javax.swing.JOptionPane;

import javax.swing.JPanel;

import javax.swing.JTextField;

import javax.swing.SwingConstants;

// Declaare and define the class MyGUI

abstract class MyGUI extends JFrame implements ActionListener {

JTextField userInput;

JLabel inputDescLbl, resultLbl;

JPanel inputPanel, resultPanel;

JButton evlBtn;

Stack<Object> stk;

// Define the constructor MyGUI

MyGUI() {

super("Tree Address Generator");

inputPanel = new JPanel(new FlowLayout());

resultPanel = new JPanel(new FlowLayout());

setLayout(new GridLayout(2, 1));

userInput = new JTextField(20);

inputDescLbl = new JLabel("Enter Postfix Expression:");

evlBtn = new JButton("Construct Tree");

evlBtn.addActionListener(this);

resultLbl = new JLabel("Infix Expression:", SwingConstants.LEFT);

add(inputPanel);

add(resultPanel);

inputPanel.add(inputDescLbl);

inputPanel.add(userInput);

inputPanel.add(evlBtn);

resultPanel.add(resultLbl);

stk = new Stack<Object>();

}

}

//Stack.java:

// Declare and define the class Stack

class Stack {

private int[] a;

private int top, m;

public Stack(int max) {

m = max;

a = new int[m];

top = -1; }

public void push(int key) {

a[++top] = key; }

public int pop() {

return (a[top--]); }

}

// Declare and define the class Evaluation()

class Evaluation {

public int calculate(String s) {

int n, r = 0;

n = s.length();

Stack a = new Stack(n);

for (int i = 0; i < n; i++) {

char ch = s.charAt(i);

if (ch >= '0' && ch <= '9')

a.push((int) (ch - '0'));

else if (ch == ' ')

continue;

else {

int x = a.pop();

int y = a.pop();

switch (ch) {

case '+':

r = x + y;

break;

case '-':

r = y - x;

break;

case '*':

r = x * y;

break;

case '/':

r = y / x;

break;

default:

r = 0;

}

a.push(r);

}

}

r = a.pop();

return (r);

}

}

// PostfixToInfix.java:

// Import packages

import java.util.Scanner;

import java.util.Stack;

// Declare and define the class PostfixToInfix

class PostfixToInfix {

// Determine whether the character entered is an operator or not

private boolean isOperator(char c) {

if (c == '+' || c == '-' || c == '*' || c == '/' || c == '^')

return true;

return false;

}

// Declare and define the convert()

public String convert(String postfix) {

Stack<String> s = new Stack<>();

for (int i = 0; i < postfix.length(); i++) {

char c = postfix.charAt(i);

if (isOperator(c)) {

String b = s.pop();

String a = s.pop();

s.push("(" + a + c + b + ")");

} else

s.push("" + c);

}

return s.pop();

}

// Program starts from main()

public static void main(String[] args) {

PostfixToInfix obj = new PostfixToInfix();

Scanner sc = new Scanner(System.in);

// Prompt the user to enter the postfix expression

System.out.print("Postfix : ");

String postfix = sc.next();

// Display the expression in infix expression

System.out.println("Infix : " + obj.convert(postfix));

}

}

Output:

e Console X terminated PostfixTolnfix [Java Application] C:\Program Files\Java\jrel.8.0_121\bin\javaw.exe Postfix : ABD++C-D/ .

3 0
3 years ago
Consider the following fragment of code in an authentication program:
Juli2301 [7.4K]

Answer:

Backdoor

Explanation:

The back door fragment in a program allows user to access backdoor information without necessarily following the common security procedures needed. In this case, once the programmer keys in the username he or she logs in without putting password. Therefore, this is a backdoor fragment.

8 0
3 years ago
Other questions:
  • Let suppose, you are going to develop a web-application for school management system. Then what architectural pattern will you u
    9·1 answer
  • What was the main drawback of Ford’s assembly line?
    12·2 answers
  • Why is it important to cut all the way through an electrical wire on the first try?
    8·1 answer
  • Write a script (Program 2) to perform t he following matrix operations. Use output commands to clearly output each problem with
    15·1 answer
  • What is the role of the architects in modern development​
    15·1 answer
  • A circuit contains four 100 ohm resistors connected in series. If you test the circuit with a DMM you should read a total resist
    14·1 answer
  • Mention verious medium level and higher level human resources related to engineering​
    6·1 answer
  • Drag each label to the correct location on the chart. Classify the organisms based on how they obtain food.
    14·2 answers
  • What is the least count of screw gauge?<br> (a) 0.01 cm<br> (b) 0.001 cm<br> (c) 0.1 cm<br> (d) 1 mm
    13·1 answer
  • How the LED (light emitting diode) works?​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!