Answer: This is a partial list of basic safety precautions to use when working on a computer: Remove your watch and jewelry and secure loose clothing. Turn off the power and unplug equipment before performing service. Cover sharp edges inside the computer case with tape. Never open a power supply or a CRT monitor.
Make sure the space underneath your desk is free from clutter and your legs have room to move. Use your mouse as close to the keyboard as possible. Adopt good posture while at the computer. Know how to adjust your chair to the most comfortable position.
Answer C in the paragraph group on the home tab
The first thing we are going to do is find the equation of motion:
ωf = ωi + αt
θ = ωi*t + 1/2αt^2
Where:
ωf = final angular velocity
ωi = initial angular velocity
α = Angular acceleration
θ = Revolutions.
t = time.
We have then:
ωf = (7200) * ((2 * pi) / 60) = 753.60 rad / s
ωi = 0
α = 190 rad / s2
Clearing t:
753.60 = 0 + 190*t
t = 753.60 / 190
t = 3.97 s
Then, replacing the time:
θ1 = 0 + (1/2) * (190) * (3.97) ^ 2
θ1 = 1494.51 rad
For (10-3.97) s:
θ2 = ωf * t
θ2 = (753.60 rad / s) * (10-3.97) s
θ2 = 4544,208 rad
Number of final revolutions:
θ1 + θ2 = (1494.51 rad + 4544.208 rad) * (180 / π)
θ1 + θ2 = 961.57 rev
Answer:
the disk has made 961.57 rev 10.0 s after it starts up
Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-
- Takes control over the hazardous situation and maintain the security
- System security will also increase the development of the system easily.
- Approach towards the analyzing of the system function
- Data, information and functions are safe from being detected in unauthorized way.
- Functions and implementation is made easy without the fear of getting attacked or hacked.
A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.
<h3>What are Cybersecurity objectives?</h3>
Cybersecurity aims are:
- To protect computer system,
- To protect networks,
- To protect software programs from such cyber attacks.
Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.
Learn more about IT from
brainly.com/question/1276995
#SPJ1