Answer:
Engineer A results will be more accurate
Explanation:
Analytical method is better than numerical method. Engineer A has used analytical method and therefore his results will be more accurate because he used simplified method. Engineer B has used software to solve the problem related to heat transfer his results will be approximate.
Answer:
Upper bounds 22.07 GPa
Lower bounds 17.59 GPa
Explanation:
Calculation to estimate the upper and lower bounds of the modulus of this composite.
First step is to calculate the maximum modulus for the combined material using this formula
Modulus of Elasticity for mixture
E= EcuVcu+EwVw
Let pug in the formula
E =( 110 x 0.40)+ (407 x 0.60)
E=44+244.2 GPa
E=288.2GPa
Second step is to calculate the combined specific gravity using this formula
p= pcuVcu+pwTw
Let plug in the formula
p = (19.3 x 0.40) + (8.9 x 0.60)
p=7.72+5.34
p=13.06
Now let calculate the UPPER BOUNDS and the LOWER BOUNDS of the Specific stiffness
UPPER BOUNDS
Using this formula
Upper bounds=E/p
Let plug in the formula
Upper bounds=288.2/13.06
Upper bounds=22.07 GPa
LOWER BOUNDS
Using this formula
Lower bounds=EcuVcu/pcu+EwVw/pw
Let plug in the formula
Lower bounds =( 110 x 0.40)/8.9+ (407 x 0.60)/19.3
Lower bounds=(44/8.9)+(244.2/19.3)
Lower bounds=4.94+12.65
Lower bounds=17.59 GPa
Therefore the Estimated upper and lower bounds of the modulus of this composite will be:
Upper bounds 22.07 GPa
Lower bounds 17.59 GPa
Okay sure.
I’ll 1)chords
2)pulse
3)aerophone
4) the answer is C
5)rhythm
Pretty sure those are the answers
Answer:
A wheelbarrow, a bottle opener, and an oar are examples of second class levers
Answer:
Integrity: involves maintaining and assuring the accuracy of data over its life-cycle
Explanation:
Confidentiality: This is a CIA triad designed to prevent sensitive information from reaching the wrong people, while making sure that the right people have access to it.
Integrity: This is a CIA triad that involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle.
Availability: This is a CIA triad that involves hardware repairs and maintaining a correctly functioning operating system environment that is free of software conflicts.
Authentication:This is a security control that is used to protect the system with regard to the CIA properties.