What does 1910.176 say about secure storage?

Answers

Answer 1

Material storage must not pose a risk. To provide stability and security against sliding or collapsing, bags, containers, bundles, etc. placed in tiers must be stacked, blocked, interlocked, and restricted.

In order to guarantee the security and integrity of stored data, several manual and automated computing procedures and technologies are utilised. This can comprise security software as well as physical protection of the gear that houses the data.

Secure data storage refers to data at rest held in network-based storage area networks (SAN) or network attached storage (NAS) systems, online/cloud, portable devices such external hard drives or USB drives, and computer/server hard discs.

The following strategies can be used to store data securely:

Data protection

a software or hardware access control mechanism for each data storage device

protection from worms, viruses, and other dangers that might damage data

Infrastructure security and physical/manned storage device security

Learn more about Security here:

https://brainly.com/question/14545949

#SPJ4


Related Questions

technician a wipes off the outside of a zerk fitting before injecting grease into it. technician b injects just enough grease to cause the boot to expand slightly. who is correct?

Answers

Most of the maximum pressure ought to be retained by the radiator cap for up to five minutes.

By increasing the pressure or by including an ingredient with a high boiling point, such as ethylene glycol, the saturation or boiling temperature can be boosted. Empirical design principles are used to create the cooling passageways in the engine block and head. Your thermostat should be located in the housing in the majority of autos. On some cars, the lower radiator hose will be connected to the thermostat housing. Consult your vehicle's service manual for more information if you need help locating your thermostat.

Learn more about radiator here-

https://brainly.com/question/28924040

#SPJ4

technician a says the presence of an excessive thrust angle can cause poor directional stability on ice, snow, or wet pavement. technician b says an excessive thrust angle can increase tire wear. who is correct?

Answers

The front wheels' direction of travel can be predicted by the thrust angle. So, failing to consider this angle can compromise even the front suspension that has been precisely aligned.

As the front wheels steer to align themselves with the intended direction of the vehicle, it may cause the steering wheel to become misaligned. The toe angle is the most prone to misalignment of any angle. When on the road, a toe that has been correctly calibrated to manufacturer specifications—which may be slightly positive or negative—will be at zero (0o). Tire tread wear with a one-sided shoulder signifies that the inner or outside shoulder rib is much more worn than the other ribs.

Learn more about specification here-

https://brainly.com/question/18503842

#SPJ4

a transformer has a 240 v primary and a 120 v secondary. with a 30 ohm load connected, what is the primary voltamps?

Answers

A transformer has a 240 v primary and a 120 v secondary. with a 30 ohm load connected, The primary volt-amps 480a.

What is transformer?

A transformer is a passive part that moves electrical energy from one circuit to another, or between several circuits. A changing electromotive force (EMF) is caused by a changing magnetic flux in the transformer's core, which is caused by a changing current in any of the transformer's coils.

This EMF is then changed in any other coils wound around the same core. There is no need for a metallic (conductive) connection between the two circuits in order for electrical energy to be transferred between separate coils. The induced voltage effect in any coil caused by a shifting magnetic flux surrounding the coil is described by Faraday's law of induction, which was discovered in 1831.

Learn more about transformer

https://brainly.com/question/26787198

#SPJ1

deals with accounting, legal, property, and administration of a project, while the ______ ensures the project's processes are performed correctly.

Answers

Project administration deals with accounting, legal, property, and administration of a project ,  while the project manager ensures the project's processes are performed correctly.

Project administrative :

A quality manager oversees a project's processes, not the quality of the project's deliverables, and takes steps to ensure that they are being performed correctly according to specifications. Project management manages accounting, legal, property, and human resources.

What is a project manager in an organization?

A project manager is the person responsible for executing a project. Individuals lead and manage project teams on a day-to-day basis with the authority and responsibilities of the project committee.

What does a project manager do?

A project manager is responsible for planning, procuring, executing, and completing a project. The project manager is responsible for the entire project and is responsible for all tasks such as: Project scope, project team leadership, and resources allocated to the project.

Learn more about project managers :

brainly.com/question/6500846

#SPJ4

Which is the correct statement regarding the relative Rf values of the starting methyl benzoate vs the product, methyl m-nitrobenzoate on a silica gel TLC plate. The product has a lower Rf value on a silica gel TLC plate because it is more polar than the starting methyl benzoate. The product has a lower Rf value on a silica gel TLC plate because it is less polar than the starting methyl benzoate. The product has a higher Rf value on a silica gel TLC plate because it is less polar than the starting methyl benzoate. The product has a higher Rf value on a silica gel TLC plate because it is more polar than the starting methyl benzoate.

Answers

The product has a higher Rf value on a silica gel TLC plate because it is less polar than the starting methyl benzoate. In general, on a silica gel TLC plate, compounds with lower polarity will have higher Rf values than more polar compounds.

On a silica gel TLC plate, the product (methyl m-nitrobenzoate) will have a higher Rf value than the starting material (methyl benzoate) because it is less polar. This is because the silica gel has a non-polar surface, and less polar compounds will have a stronger affinity for the surface of the silica gel. As a result, less polar compounds will move more slowly up the plate, giving them a higher Rf value. On the other hand, more polar compounds will have a weaker affinity for the non-polar silica gel, and will move more quickly up the plate, giving them a lower Rf value.

Learn more about RF value, here https://brainly.com/question/17132198

#SPJ4

List the parts of a master cylinder.

Answers

All the parts are listed below.

Open System

Closed System

Single Cylinder

Ported Tandem Cylinder

Portless Master Cylinder

technician a says v-belts are automatically tensioned. technician b says serpentine belts are manually adjusted and require periodic adjustment. who is correct?

Answers

V-belts are automatically tensioned, whereas serpentine belts must be manually adjusted and periodically adjusted, therefore both technicians A and B are accurate.

As a transmission belt, the V-belt serves. By connecting the V-belt pulleys, it transfers engine power to auxiliary parts like the alternator and the power steering hydraulic pump.

The rubber belt that powers the alternator, air conditioning compressor, power steering pump, and water pump is known as a V-belt. The "V"-shaped cross-section of the belt is what gives it the name "V-belt." All belts require replacement as they become worn out over time.

According to Firestone, a serpentine belt is a single, extended rubber belt that runs the length of the engine of your automobile. It powers a number of important parts, including the alternator, power steering pump, air conditioning, and occasionally the water pump.

Learn more about V-belts here:

https://brainly.com/question/29353673

#SPJ4

in this homework, you are asked to implement a multithreaded program that will allow us to measure the performance (i.e., cpu utilization, throughput, turnaround time, and waiting time in ready queue)

Answers

The first step in implementing this program is to determine the algorithm that you want to measure the performance of. This could be anything from sorting algorithms to graph algorithms.

More about algorithm
Once you have chosen the algorithm, you need to design the program to measure its performance. This will involve creating a thread for each algorithm that will execute the algorithm, as well as other threads to measure the various performance metrics.
You will also need to design a user interface that will allow the user to start and stop the thread executing the algorithm, as well as display the results of the performance measurements. Additionally, you will need to implement any necessary synchronization between the threads to ensure that the performance measurements are accurate.
Once you have designed the program and implemented the threads, you can begin executing the program to measure the performance of the algorithm. You can use various techniques to analyze the performance, such as tracking the average throughput or turnaround time, or measuring the cpu utilization. Additionally, you may want to compare the performance of the algorithm to other algorithms in order to determine which one is the most efficient.
Finally, you can present your results in a meaningful way, such as a graph or table, so that the user can easily interpret the data and understand the performance.

To know more about algorithm
https://brainly.com/question/22984934
#SPJ4

Refer to the exhibit. Serverb is attempting to contact hosta. Which two statements correctly identify the addressing that serverb will generate in the process?.

Answers

The statements which correctly identify the addressing that serverB will generate in the process are:

ServerB will generate a frame with the destination MAC address of RouterB.ServerB will generate a packet with the destination IP address of HostA.

Define the MAC address.

Each device on a network is identified only by its Media Access Control address (MAC address), which is a hardware identification. The maker assigns it mostly. On the network interface controller (NIC) card of a device, they are frequently seen. Unicast, Multicast, and Broadcast are the three different categories of MAC addresses.

Simply examining the first byte will allow you to determine the sort of address you are viewing. The first byte of a unicast address, for instance, will be even, such as 02, 04, 06, etc. For network protocols like TCP/IP to operate, MAC is a crucial component. Both broadband routers and computer operating systems allow users to view and occasionally modify MAC addresses.

To learn more about a MAC address, use the link given
https://brainly.com/question/24812654
#SPJ4

water is pumped at a rate of 3 ft3/s from a reservoir 20 ft above a pump to a free discharge 90 ft above the pump. the pressure on the intake side of the pump is 5 psig and the pressure on the discharge side is 50 psig. all pipes are commercial steel of 6 in. diameter. determine the head supplied by the pump and the total head loss between the pump and point of free discharge.

Answers

The head supplied by the pump at a rate of 3ft/s is 309.96m, The total head loss between the pump and point of free discharge is 26.822m.

As mentioned in the question the height of the reservoir is  = 20ft

Pressure on the intake side of the pump is =  5 psig  =  34.4kpascal

Pressure on the discharge side of the pump is  = 50 psig =  344.4kpascal

converting water pumped from 3f/s to m/s  = 0.91

Here the diameter of the pipe is  d = 6 inches which is  = 0.15,m

a) The head supplied by the pump is  as per Bernoulli's theorem:

P1+21ρv12+ρgh1=P2+21ρv22+ρgh2

So here in this condition

ρv12 = ρv22

where vi = vd

zi = zd

Now

pi/pg + Handpump = p1/pg

handpump = 344.4k - 34.4k/(0.91)

=309.96 m

Therefore the head supply by the pump is 309.96m

b) Total head loss between the pump and point of free discharge is

since  vd = v

We can say the head loss = (6.096 - 0 ) X 1000/9.8 x 1000  =  0.61 - 27.432

= 26.822

Hence the head supplied by the pump is  309.96m

The head loss is 26.822m

To know more on head loss follow this link:

https://brainly.com/question/15027705

#SPJ4

For given five processes apply: (a) Equal memory allocation algorithm (b) Proportional memory allocation algorithm. The sizes of these five processes are:S1=1,000 pages S2=2,000pagesS3=7,000pagesS4=10,000pagesS5=20,000pagesm=10,000avaialble number of page frames in main memory. (c) What is the total nuber of PMT entries in the main memory for these five processes (d) What is the total memory size in BYTES for all five PMTs. Upload

Answers

(a) Equal memory allocation :  Available frames  10000. So each process gets 100000/5 = 2000 frames

(b) Proportional memory allocation: Sum of all pages = 50,000. m= 10,000.

(c)  Total 50,000 PMT entries

(d) 1 PMT = 4 bytes

What is memory?

The instructions and data that a computer needs to access quickly are stored electronically in memory. It is where data is kept for quick access. One of a computer's fundamental functions is memory because without it, a computer would not be able to perform as intended. The operating system, hardware, and software of a computer all use memory.

Computer memory comes in two varieties: primary and secondary. Memory is a shorthand for primary memory or an acronym for random access memory, a particular kind of primary memory (RAM). This kind of memory is housed on microchips that are physically close to the microprocessor in a computer.

Learn more about memory

https://brainly.com/question/26551765

#SPJ4

One situation that can make a measurement with a laser inaccurate is measuring to a _____.

Answers

One situation that can make a measurement with a laser inaccurate is measuring to a reflective surface.

Measuring to a reflective surface with a laser can be challenging since the light from the laser will bounce off the surface and create an inaccurate measurement.

Ensuring Accurate Measurement with a Laser to a Reflective Surface

In order to ensure accurate measurements, it is important to take precautions when measuring to a reflective surface. If possible, the surface should be covered with a non-reflective material so that the laser light does not bounce off it. Additionally, it is best to measure from a distance to avoid any potential reflections. Taking these steps can help to ensure that the measurements taken with a laser are accurate and reliable.

Learn more about Measurement: https://brainly.com/question/25716982

#SPJ4

One of the ways web mining improves web experiences is through site visibility, Site visibility includes how and appears when queries are executed in a search engine, Multiple Choice why where when how

Answers

One of the ways web mining improves web experiences is through site visibility. Site visibility includes how and when website appears when queries are executed in a search engine.

What is web mining?

Web mining is the process of using algorithms and data mining techniques to extract information directly from the Web, including Web documents and services, Web content, hyperlinks, and server logs. Web mining aims to identify patterns in Web data by gathering and analyzing data to gain understanding of trends, the market, and users in general.

Web mining is a subset of data mining that focuses on using the World Wide Web as the main source of data, including all of its elements, from Web content to server logs and everything in between. The information contained in data mined from the Web may be a compilation of facts that Web pages are designed to include. These facts may include text, structured data like lists and tables, as well as images, video, and audio.

Learn more about Web mining

https://brainly.com/question/28538492

#SPJ4

two identical massless springs are hung from a horizontal support. a block of mass 1.2 kilograms is suspended from

Answers

The each springs have springs constant is 40N/m

How to calculate springs constant?

m = mass = 1.2 kg

g = gravity = 10 m/s^2 (assumed)

x = additional length when stretched = 0.15 m

We can calculate the springs constant using this formula,

k = f/x

Since, we given the mass so we can change force with mass * gravity. So,

k = m*g/x

= 1.2*10/0.15

= 80 N/m

In the question we already know that this is two identical spring so the springs constant from two spring is 80 N/m. For each spring is,

k each spring = 80/2

= 40 N/m

You question is incomplete, but most probably your full question was

(image attached)

Learn more about springs constant here:

brainly.com/question/26059402

#SPJ4

A layer of padding is added to car dashboards because it can reduce some injuries during a collision. How does the padded dashboard make people safer?.

Answers

Answer:

If a crash were to happen it would help ease the impact and reduce the amount of traumatic head injury.

Explanation:

What is the breaking strength of 1/8 wire rope?

Answers

Breaking Strength: The breaking strength of 1/8 wire rope is 2,000 lbs. It is directly derived from the reference values.

The capacity of a substance to endure a pulling or tensile force is known as breaking strength. Units of force per cross-sectional area are often used to measure it. In engineering, particularly in the disciplines of material science, mechanical engineering, and structural engineering, this idea is crucial.

One of the most critical and often measured qualities of materials used in structural applications is the capacity to withstand breaking under tensile stress. Brittle materials require more breaking or tensile strength than ductile ones.

Tensile strength, fracture strength, and maximum tensile strength are further terms for breaking strength.

Learn more about Strength here:

https://brainly.com/question/15741538

#SPJ4

What does SWL mean for weight?

Answers

The safe working load (SWL) is the amount of weight or force that a piece of lifting gear, accessory, or device may securely utilise to raise, suspend, or lower a mass without risk of failure.

Occasionally referred to as the Normal Working Load (NWL) The greatest safe force that a piece of lifting equipment, lifting device, or accessory may apply to raise, suspend, or lower a given mass without danger of breaking is known as the Safe Working Load (SWL), sometimes known as the Normal Working Load (NWL). Usually, the maker will mark the item. It is calculated by dividing the Minimum Breaking Strength (MBS), also known as the Minimum Breaking Load (MBL), by a safety factor, which for lifting equipment typically ranges from 4 to 6. If the equipment poses a threat to a person's life, the factor might be as high as 10:1 or 10 to 1.

The maximum working load intended by the manufacturer is known as the working load limit (WLL).

Learn more about SWL here:

https://brainly.com/question/27749897

#SPJ4

Objective:This assignment will introduce you to interprocess synchronization mechanisms in UNIX using named POSIX semaphores, pthread mutex semaphores, and pthread condition variables.Problem:You must write a C++ program to implement a parallel Fibonacci code generator you created for programming assignment 1 using synchronization mechanisms.Your program will read the input from STDIN.This program reads the information about the alphabet (symbols and frequencies) from STDIN, sorting the symbols in the alphabet in decreasing order based on the frequency. If two or more symbols have the same frequency, you will use the symbol's ASCII value to break the tie (the higher the value, the higher the priority).After assigning a positive integer value (starting from 1) to the symbols in the sorted alphabet, your program must create a child thread per number of symbols in the alphabet. Each child thread will determine the Fibonacci code based on the received integer value from the main thread. After the child threads calculate the Fibonacci code, they will print the information about the symbol, its frequency, and the Fibonacci code, writing the Fibonacci code into a memory location available to the main thread. Finally, the main thread will use the codes generated by the child threads to decompress a file.Each child thread will execute the following tasks:Receive the integer value needed to calculate the Fibonacci code from the main thread.Calculate the Fibonacci code.Print the information about the symbol (symbol, frequency, Fibonacci code). You must use the output message provided in the example below.Write the received information into a memory location accessible by the main thread.Finish its execution.Input Format: The Moodle server will use input redirection using the following input file format:The number of symbols in the alphabet (integer value)n lines (where n is the number of symbols in the alphabet) with the information about the symbols in the alphabet. Each line has one character and one integer representing a symbol and its frequency (separated by a single white space).The name of the compressed file.Example Input File:7C 2O 1S 113 26 10 1compfile1.txtYour program must print the information about the symbols based on their order in the input file. Therefore, you must use synchronization mechanisms to guarantee that child threads print the information about each symbol in the correct order.After receiving the Fibonacci codes from the child threads, the main thread decompresses the contents of a file (sequence of bits represented as a string) and prints the decompressed message.Given the previous input file and the following compressed file:111011001111010110110110001110011The expected output is:Symbol: C, Frequency: 2, Code: 11Symbol: O, Frequency: 1, Code: 1011Symbol: S, Frequency: 1, Code: 0011Symbol: , Frequency: 1, Code: 01011Symbol: 3, Frequency: 2, Code: 011Symbol: 6, Frequency: 1, Code: 00011Symbol: 0, Frequency: 1, Code: 10011Decompressed message = COSC 3360

Answers

The previous input file and the following compressed:

#include <iostream>

#include <string>

#include <queue>

#include <cstdlib>

#include <pthread.h>

#include <semaphore.h>

using namespace std;

struct SymbolFrequency

{

   char symbol;

   int frequency;

};

struct FibonacciCode

{

   char symbol;

   int frequency;

   string code;

};

queue<SymbolFrequency> symbolQueue;

queue<FibonacciCode> codeQueue;

sem_t semaphore;

void* generateFibonacciCode(void* arg)

{

   // Wait on semaphore

   sem_wait(&semaphore);

   // Get symbol and its frequency from the queue

   SymbolFrequency sf = symbolQueue.front();

   symbolQueue.pop();

   // Calculate Fibonacci code

   int a = 0;

   int b = 1;

   string code = "";

   for (int i = 0; i < sf.frequency; i++)

   {

       int c = a + b;

       a = b;

       b = c;

       code += '1';

   }

   for (int i = 0; i < sf.frequency - 1; i++)

   {

       code += '0';

   }

   // Create FibonacciCode struct

   FibonacciCode fc;

   fc.symbol = sf.symbol;

   fc.frequency = sf.frequency;

   fc.code = code;

   // Push it to the queue

   codeQueue.push(fc);

   // Print symbol, frequency, and code

   cout << "Symbol: " << fc.symbol << ", Frequency: " << fc.frequency << ", Code: " << fc.code << endl;

   // Post semaphore

   sem_post(&semaphore);

   return nullptr;

}

int main()

{

   // Read number of symbols

   int n;

   cin >> n;

   // Read symbols and their frequencies

   for (int i = 0; i < n; i++)

   {

       SymbolFrequency sf;

       cin >> sf.symbol >> sf.frequency;

       symbolQueue.push(sf);

   }

   // Initialize semaphore

   sem_init(&semaphore, 0, 1);

   // Create n threads

   pthread_t threads[n];

   for (int i = 0; i < n; i++)

   {

       pthread_create(&threads[i], nullptr, generateFibonacciCode, nullptr);

   }

   // Wait for threads to finish

   for (int i = 0; i < n; i++)

   {

       pthread_join(threads[i], nullptr);

   }

   // Read and decompress file

   string fileName;

   cin >> fileName;

   

   ifstream file(fileName);

   string compressedString;

   file >> compressedString;

   file.close();

   string decompressedString = "";

   for (int i = 0; i < compressedString.length(); i++)

   {

       for (int j = 0; j < codeQueue.size(); j++)

       {

           if (codeQueue.front().code[i] == compressedString[i])

           {

               decompressedString += codeQueue.front().symbol;

               break;

           }

           else

           {

               FibonacciCode fc = codeQueue.front();

               codeQueue.pop();

               codeQueue.push(fc);

           }

       }

   }

   cout << "Decompressed message = " << decompressedString << endl;

   return 0;

}

What is symbol frequency?

Symbol frequency is a measure of the number of times a symbol appears in a given sample of data. It is used in coding theory, cryptography, telecommunications, and other areas of mathematics to analyze the structure and complexity of a message or data stream. Symbol frequency can be used to detect patterns and anomalies in data, or to encode and decode messages. In telecommunications, it is used to measure the quality of a signal or data transmission, or to determine the strength of a signal. Symbol frequency analysis is also used to study the language of a document, such as its syntax, grammar, and punctuation.

To learn more about symbol frequency
https://brainly.com/question/15864925
#SPJ4

which of these appliances uses the least amount of power on an annual basis? power (w) average hours used/year television 350 1,440 water heater 2,800 1,044 refrigerator 180 6,000 washing machine 700 144 clothes dryer 700 455 question 1 options: a) television b) water heater c) refrigerator d) washing machine e) clothes dryer question 2 (1 point)

Answers

Answer:

In order, Television, Refrigerator, Washing machine, clothes dryer, and then water heater.

Explanation:

The television doesn't have a heating element, the refrigerator only has a small motor, and the clothes dryer and water heater have heating elements.

Question 1 a cyclical redundancy check (crc) is an example of what type of built-in protocol mechanism?.

Answers

Using the cyclic redundancy check (CRC) method, mistakes in digital data can be found. The CRC generates a fixed-length data set as a sort of checksum depending on the construction of a file or bigger data set.

a particular checksum used to verify transmission errors that is appended to the end of a data packet. The term "cyclical redundancy check," or CRC, refers to a crucial idea in data integrity that is applied throughout many aspects of computing, not simply network transfers. A CRC is essentially a mathematical transformation that multiplies a bigger collection of data by a smaller quantity using polynomial division. Colon characters are used in place of groups of zeros when shortening an Internet Protocol (IP) v6 address. all leading zeros are eliminated.

Learn more about transfers here-

https://brainly.com/question/26936962

#SPJ4

a 150-m length of smooth horizontal pipe is attached to a large reservoir. what depth, d, must be maintained in the reservoir to produce a volume flow rate of 0.0084 m3 /s of water? the head loss is 5.15 m. the inside diameter of the smooth pipe is 90 mm. the inlet is sharp-edged.

Answers

The calculated value is P 2 = 500 Pa. The amount of fluid travelling through a specific cross sectional area per unit time is known as the volume flow rate Q of a fluid.

1 atmosphere (101.3 kPa), or 14.696 psia at 32 0F, is the standard flow rate (0 0C). The volume of fluid that actually moves through a given site at a given pressure and temperature is known as the actual flow rate.

We may determine the velocity at another point using the equation of continuity. There is a one.

​ \s v \s1 \s​ \s =a \s2 \s​ \s v \s2

​⇒10×1=5×v \s2 \s​

⇒v \s2 \s​ \s =2m/s

The Bernoulli's theorem states that for water at a certain height, P= 2 (v 1 2 v 2 2)

​P= 2 1000(1 2 2 2 ) = 1 500 Pa, P 2 P 1 = 1 500 Pa, P 2 2000= 1 500 Pa, and P 2 = 500 Pa.

Learn more about specific here-

https://brainly.com/question/19819958

#SPJ4

T or F: Plant documentation is used during the conduct of a PHA; that documentation can be mostly correct for a good study.

Answers

Plant documentation is used during the conduct of PHA; that documentation can be mostly correct for some good study. (False)

What is PHA?

PHAs are an acid that exfoliates the skin and promotes skin cell renewal while also assisting in hydration. The visibility of fine lines and wrinkles is effectively diminished by these qualities. Additionally, they don't irritate the skin as much as other exfoliating ingredients like AHAs and BHAs do.

PHAs provide an even skin tone by exfoliating the skin by removing dead skin cells from the surface. PHAs are a class of acids derived from both plants and animals that help to reveal skin that is more hydrated, smooth, and youthful.

PHAs can be found in a number of skincare items, including serums and toners that use citric acids as their base. But before using anything with PHA in it, make sure to talk to your doctor.

Learn more about PHA

https://brainly.com/question/9992412

#SPJ4

What is the working load limit of 7/8 wire rope?

Answers

The maximum operating load for 7/8 wire rope is 45.4 tonnes for rotation-resistant crane wire rope.

Working load limits usually have a substantial margin of safety since they are a portion of tensile strength. The working load limit for wire ropes is frequently set at 20% of tensile strength.

Calculating the breaking load limit (BLL) and the working load limit (WLL) (SF). If a safety factor of 5 (5:1, 5 to 1, or 1/5) is utilised, a chain with a BL of 2,000 lb. and a WLL of 400 lb. would serve as an illustration.

The maximum working load that the manufacturer has defined is known as the working load limit (WLL). The Minimum Breaking Load, sometimes referred to as this load, is the mass or force that must be present for the lifting apparatus to fail or surrender.

Learn more about Maximum here:

https://brainly.com/question/15290235

#SPJ4

which aspects of this building are typical of cistercian structures and representative of their lifestyle, but are not found in cluniac buildings?

Answers

Cluniac buildings lack the painting and other features that make cistercian constructions distinctive and indicative of their way of life.

The Cluniac buildings did not fully grow until St. Bernard and his associates joined the Order in 1112; from this time on, a new spiritual militia emerged to challenge the rules established by the Order of Cluny a century earlier. The Cistercian monastery started off as a modest location where the first monks from Molesme had gone to construct their meagre cottages where they pitifully lived and farmed their land. Over 60,000 monks quickly dispersed from the Cister abbey and established other Cistercian monasteries in Italy, Spain, and Central Europe shortly after. The Cistercian Order had 343 monasteries when St. Bernard passed away in 1153; by 1200, there were 694.

Learn more about Cluniac here:

https://brainly.com/question/7629512

#SPJ4

Which of the following are cons that come from using a Cloud Service?

Answers

Data loss or theft, Data leakage, account or service hijacking are cons that come from using a Cloud Service.

What is cloud service?

A cloud service is any infrastructure, platform, or piece of software that is hosted by a different company and made accessible to customers online. Cloud services make it easier for user data to move from front-end clients (such as users' servers, tablets, desktops, and laptops—or anything else on the users' ends) over the internet to the provider's systems and back again.

The creation of cloud-native applications and the adaptability of cloud-based operations are supported by cloud services. Only a computer, an operating system, and an internet connection are required for users to access cloud services.

Cloud computing services include the following as-a-Service options, as well as any infrastructure, platforms, software, or technologies that users access over the internet without the need for additional software downloads.

Learn more about cloud services

https://brainly.com/question/9759640

#SPJ1

What property of virtualization allows entire virtual machines to be saved as file that can moved or copied like any other file?

Question 2 options:
- Isolation
- Hardware Independence
- Partitioning
- Encapsulation

Answers

Property of virtualization that allows entire virtual machines to be saved as file that can moved or copied like any other file is known as encapsulation

What is encapsulation?

Encapsulation is a way to restrict direct access to some elements of an object, so that the user cannot access state values ​​for all variables of a particular object. Encapsulation can be used to hide both data members and data functions or methods associated with an instantiated class or object. Encapsulation in programming has a few key benefits, such as:

Hiding data: Users will have no idea how classes are being implemented or stored. All that users will know is that values are being passed and initialized.More flexibility: Enables you to set variables as red or write-only. Easy to reuse: It's easy to change and adapt to new requirements with using encapsulation

Lean more about encapsulation brainly.com/question/29107336

#SPJ4

a. explain the anisotropic and orthotropic behavior of some engineering material and compare it with the isotropic behavior. b. what is ductility and how it is measured? c. what is plastic-work and how it is calculated? d. explain true stress and true strain and find their relations with engineering stress and engineering strain. e. discuss different ways that you can manipulate the strength of metals.

Answers

a. Anisotropic materials display different properties when measured in different directions, whereas orthotropic materials display different properties when measured in three mutually perpendicular directions. Both anisotropic and orthotropic materials differ from isotropic materials, which display the same properties in all directions.

What is material?

Material is anything that exists in the physical world and can be used to create something. It can be in the form of a solid, liquid, or gas. Common materials include wood, metal, glass, plastic, rubber, paper, fabric, and stone. Materials can also be natural or synthetic, meaning they are either created by nature or created by humans. Materials are used in a variety of ways, from everyday items like clothing and furniture, to construction materials like brick and mortar, to electronic components. Materials are essential to our lives and the way we interact with the world around us.

b. Ductility is a measure of how much a material can be stretched, bent, or deformed before fracturing. It is usually measured using the percent elongation or percent reduction in area of a material specimen when it is subjected to a tensile test.

c. Plastic-work is the amount of work done by a material when it is deformed plastically. It is calculated by integrating the area under the engineering stress-strain curve.

d. True stress and true strain are measures of the actual stress and strain experienced by a material during a deformation. They are related to the engineering stress and strain by the factor of the cross-sectional area of the material specimen.

e. Different ways to manipulate the strength of metals include heat treatment, cold working, and alloying. Heat treatment involves heating and cooling the metal at specific temperatures to change its microstructure and strength. Cold working involves working the metal at a temperature below its recrystallization temperature to improve its strength. Alloying involves adding other elements to the metal to improve its strength.

To learn more about material
https://brainly.com/question/17546069
#SPJ4

An Accenture technology team located in us has added a new feature to an ewisting online tickiting platform. The team would like to have the new feature reviewed by onther global team using individual instance of the platform.
Which technology, when combined with agile and devops, will help the team receive real-time feedback ?

Answers

Answer:

Maybe artificially intelligence

Explanation:

Project management software systems can be used to map out a project in different ways according to its complexity. Which of the following statements lists software results according to low-to- high project complexity?Multiple Choice flow chart, Gantt chart, PERT chart Gantt chart, flow chart, PERT chart flow chart, PERT chart, Gantt chart PERT chart, Gantt chart, flow chart

Answers

Lists software results according to low-to- high project complexity is flow chart, Gantt chart , PERT chart.

How are Flow, PERT and Gantt charts differet from each other?

Program (or project) evaluation and review method is abbreviated as PERT. A crucial statistical tool for project management that displays how a job or project is progressing. The PERT chart is a crucial tool for project managers since it shows them the direction in which the project is going and how long it will take to finish. The Gantt chart is a crucial subject in project management. It is a project management tool that enables the team members and project managers to monitor the development of the project. Because it displays the data in bar form, the Gantt chart may also be used as a statistical tool. A flowchart is a diagram that shows how a system, computer algorithm, or process works. They are frequently used in many different disciplines to examine, organize, enhance, and convey frequently complicated processes in simple, understandable diagrams.

Both flowcharts and Gantt charts are useful tools for project planning. However, each have unique purposes and applications when it comes to project execution. A flow chart can work on its own for short-term and minor projects, but a Gantt chart is preferable for complicated plans with a longer duration. PERT charts are helpful for extensive and complicated projects. For short, easy-to-understand tasks, a Gantt chart will be helpful.

To know more about charts refer:

https://brainly.com/question/13605073

#SPJ4

Grading the soil around the foundation of a house can reduce interior home damage from water runoff. For every 6 inches in height, the soil should extend 10 feet from the foundation. What is the slope of the soil grade?.

Answers

The slope of the soil grade is 0.05 degrees.

How to calculate the slope of the soil grade?

y = rise = 6 inches

x = run = 10 feet = 120 inches

The slope is described number for steepness and direction of the line. The slope can be calculate by divide the rise or the height by the run or the horizon line.

Slope (m) = rise (y) / run (x)

m = 6 / 120

m = 0.05

Because the result is below 45 degrees, it is called a gentle slope.

Thus, the slope is 0.05 degree for the soil grade.

Learn more about slope here:

brainly.com/question/3493733

#SPJ4

Other Questions
an economics graduate student in the united states earns an $18,000 stipend per year. the u.s. sees significant inflation. how might the student react? a client who had an open cholecystectomy two weeks ago comes to the emergency department with complaints of nausea, abdominal distention, and pain. which assessment should the nurse implement? a. auscultate all quadrants of the abdomen. b. perform a digital rectal exam c. palpate the liver and spleen d. obtain a hemoccult of the client's stool Ni+2Cl2=NiCl4Then, write balanced half-reactions describing the oxidation and reduction that happen in this reaction. In 1971 congress passed the federal election campaign act this act requires federal political candidates to reveal the sources of the money used for their campaigns this money is called campaign contributions the act also limits the contributions that a person or group can donate to a single Canadianwitch of the following is most likely the main force behind the passage of this campaign law Christian is 1.35 meters tall. At 10 a.m., he measures the length of a tree's shadow tbe 38.65 meters. He stands 34.4 meters away from the tree, so that the tip of hisshadow meets the tip of the tree's shadow. Find the height of the tree to the nearesthundredth of a meter.1.35 m34-4 m38.65 mIts not 1.52 Which is NOT a type of video port? Osmosis is movement of a: A) charged solute molecule (ion) across a membrane. B) gas molecule across a membrane. C) nonpolar solute molecule across a membrane. D) polar solute molecule across a membrane. E) water molecule across a membrane. contrast the lithosphere and asthenosphere. how are the criteria used to define these layers different from the criteria used to recognize the crust, mantle and core (3 points)? Find the length of side x in simplest radical form with a rational denominator. the t-shirt factory purchased 12 futures contracts on cotton at a quoted price of 55.50 as a hedge against its inventory needs. at the time it actually needed the cotton, the spot price was 56.10. cotton futures are based on 50,000 pounds and quoted in cents per pound. how much did the shirt factory save by hedging cotton? managerial accounting can be described as the preparation and use of accounting information within the organization. another term for the antigen-hiding layer found on some bacterial besides glycocalyx or slime layer is: Water Power Corporation wants to begin operations that include the discharge of waste into navigable waters. Under the Clean Water Act, the company must install certain equipment a. with all deliberate speed after beginning operations. b. before beginning operations. c. only on a voluntary basis. d. only if a regulatory agency challenges the discharge. a loss on impairment of an intangible asset is the difference between the assets:___. liam is relaxed and laid back. he does not stress over things. liam manifests a_____personality. What is the aim or target of a fable? The diameter of a circle is 3 ft. Find its area to the nearest whole number. A 3. 92-g sample of magnesium nitrate, mg(no3)2, contains ________ mol of this compound. draw the major product formed when the given epoxide reacts with aqueous acid. an epoxide where carbon 1 has an ethyl and hydrogen substituent and carbon 2 has two methyl groups. this reacts with h 3 o plus and water. Trading stock or selling stock, selling real estate for profit, and selling other assets that gain value over time.a. Wagesb. Passivec. Earnedd. Portfolio