Description
i finished 2 and 4 , if you can help me with rest please contact me asap
the correct answer for 3 is wall stress =(3*mu*q)/(pi*r*h^2)
for 6 is pressure= (6*mu*q)/(pi*h^3)*ln(r2/r1)
final_exam_1.pdf
problems5_6.pdf
Unformatted Attachment Preview
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Super useful! Studypool never disappoints.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
IT 242 Saudi Electronic University Software Engineering Case Study
No Plagiarism , No Matching will be acceptable .No pictures containing text will be acceptable and will be considered plag ...
IT 242 Saudi Electronic University Software Engineering Case Study
No Plagiarism , No Matching will be acceptable .No pictures containing text will be acceptable and will be considered plagiarism.- No short answer as it's not acceptable for this assignment the answer should be sufficient proper examples and explanations for each questions.
University of Kentucky Financial Crisis Discussion
1)Reflect on the assigned readings for the week. 350 words Respond to the following prompts: “What do I feel are the mos ...
University of Kentucky Financial Crisis Discussion
1)Reflect on the assigned readings for the week. 350 words Respond to the following prompts: “What do I feel are the most important aspects of my learning in the chapters this week?” and “What about this learning was really worthy of my time and understanding?” Then explain how important it is in society or business.
Also, provide a graduate-level response to each of the following questions:
a)Pick a major U.S. industry, such as automobiles or computers, and discuss the lapses in technology and innovation on the domestic front that permitted foreign competitors to get a foothold and, in some cases, a dominant share of the market. Who or what do you think was to blame for this situation?
b)In the mid-1980s, General Motors undertook a $5 billion program to introduce robotics and computer-integrated manufacturing techniques into many of its assembly plants. The results were disappointing, to say the least. Enormous technical problems dogged the program from the beginning, and the ultimate gains in productivity were decidedly modest. What do you think went wrong? Why? From the long-term perspective, was the automation program a good idea?
2)Identify a new product that is based on an innovation in technology, and draw up a strategic technical plan for its development. Be sure to discuss the risk factors at each stage, and indicate how you would deal with each.
EEGR 390 Job Shop Scheduling Program Model
Please do the attached individually. This will solidify your understanding of the related statistical concepts of the Job ...
EEGR 390 Job Shop Scheduling Program Model
Please do the attached individually. This will solidify your understanding of the related statistical concepts of the Job Shop Models. For this assignment you will submit the following:Listing of program codeOutput from compilation and execution of codeSummary of results
IT 304 Southern New Hampshire University Millennia HealthCenter Implementation Plan
CompetencyIn this project, you will demonstrate your mastery of the following competency:Develop an implementation planSce ...
IT 304 Southern New Hampshire University Millennia HealthCenter Implementation Plan
CompetencyIn this project, you will demonstrate your mastery of the following competency:Develop an implementation planScenarioAs in the previous project, Millennia HealthCenter will be implementing a new software system. The system requirements specification (SRS) has been reviewed and approved by all stakeholders. At this stage in the process of implementing this system, you have been assigned the role of systems analyst. Now your job is to create the system’s implementation schedule and plan. As you develop this plan, you will also have to determine a life cycle for the system’s development because the team is undecided on which life cycle to choose.DirectionsReview the business case that describes the implementation of a software system. It is the same case used in Project One.Be sure to read through the entire case again. You want to avoid missing any valuable information that should be considered in an implementation plan.Review the feedback that you received from your instructor on Project One. You should use your SRS to make decisions on how you would implement the system.Develop an implementation schedule and plan for the software system outlined in the business case. You may use MS Project or Microsoft Excel to develop your schedule and insert it into the Implementation Plan Template, as it is part of your implementation plan. Your implementation schedule and plan must include the following:An introduction that explains the purpose of the implementation plan and the overview of the system that is being implementedThe phases, such as:ScopeAnalysisRequirementsDesignDevelopmentTestingTrainingDocumentationPilotDeploymentPost implementationThe tasks that occur within a phase, such as:RequirementsResponsibilitiesDuties that need to be completed throughout the implementation processThe resources, such as:Personnel involved with the projectHardware and software neededProper training for personnel involved with the projectThe durations and estimates to specify how long you think each task will take, such as:Implementation time that it will take to complete each taskWhen each task is estimated to be completed, including start and finish datesThe task dependencies, such as:Tasks that need to be completed prior to moving on to another taskTasks that need to be completed at the same time (parallel tasking)Two to three ways in which you will monitor performance of the system and the user experience, such as:Access times that indicate a lag timeHelp desk complaints and ticketsSystem downtimeSystem availabilityDatabase inquiriesWhat to SubmitTo complete this project, you must submit the following:Implementation PlanUpload your implementation plan, using the Implementation Plan Template, in .doc or PDF format. Your plan could include a graphic of your implementation schedule, which you can create using MS Project or Microsoft Excel. If you’re unable to include your schedule in your plan, you should upload it as a separate file.Supporting MaterialsThe following resource(s) may help support your work on the project:Business Case for Millennia HealthCenterThis resource is the same business case that you used to complete Project One. It emphasizes the importance of understanding the organization and the system that will be implemented. Without understanding the situational context, you will find it more difficult to have a solid understanding of how the system should be implemented.Personnel and Staffing CostsThis document includes a list of potential personnel that you might decide to employ on the project, plus the average costs of each role. This resource will help you develop a minimum budget.MS Project ProfessionalThis resource will help you navigate through MS Project. If you decide to use MS Project, it is recommended that you use the Software Development Plan.Microsoft ExcelThis resource will help you navigate through Excel. Since there is no set template, you will have to be sure you include all of the requirements of the implementation plan.Implementation Plan TemplateUse this template to complete Project Two. The template will guide you through all of the sections that you may find in a project’s implementation plan. This file will download as a .doc file onto your computer. As you make progress on it, be sure to save it every now and then.
ISOL 631 Academy of Computer Education DoD Information System Report
Purpose:This course project is intended to assess your ability to identify, design, and organize information technology (I ...
ISOL 631 Academy of Computer Education DoD Information System Report
Purpose:This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.
Q1. Submit a bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains.
You should consider the following laws in the report
Department of Defense Instruction (DoDI) issues plans and implementations of policies that allocates relations required to contribute security situational awareness as identified by the DoD policies and agreements.
undefined
National Institute of Standards and Technology (NIST) is a known cybersecurity framework used to provide guidance on what processes and controls should be implemented. These standards are in place to protect services and consumers of information systems.
North American Electric Reliability Corporation (NERC) has cyber security standards focused on ensuring the reliability of the Bulk Electric System (BES).
Federal Information Processing Standards (FIPS) Publications are guidelines exercised by all agencies to classify, manage, operate, and control security requirements of all information and information systems collected or maintained to for or by the federal government.
International Standards Organization (ISO) a certified security standard for the creation and maintenance of assets and requirements to ensure the Confidentiality, Integrity, and Availability (CIA) of all Information Technology (IT) and Information Systems (IS).
You should add more policies in different domains
For example, some common standards that organizations deploy to control and reduce risk for the user domain includes:
Acceptable Use Policy – the UAP needs to cover all users and the way they will protect access and discloser of information.
Remote Access – access through virtual private networks (VPN) will be limited to a few individuals and data deemed critical will not be allowed across a VPN.
User Account Requests – all new accounts will be processed by requests that are signed off by hiring manager and human resources. The accounts will then be partitioned to active directory.
User Accounts Disable – all users accounts will be closed withing 15 days of termination. Users that go on long term leave will have accounts disabled until return to duty.
Personal Equipment Usage – no critical information should be accessed through any device except company approved devices.
Email – all critical and sensitive labeled information shall not used in any email except corporate approved.
Passwords – all passwords must be of minimum length (9 characters) and include letters, numbers, and special characters.
PWD (Password) Change – all passwords will be changed every 60 days.
Complete Multism Circuits and Lab Work NEED A MULTISM EXPERT
COMPLETE TWO PART ASSIGNMENT....PART 1 AND LAB PART 2PART 1:Fundamental Properties of AC Circuits/LabRC and L/R CircuitsCo ...
Complete Multism Circuits and Lab Work NEED A MULTISM EXPERT
COMPLETE TWO PART ASSIGNMENT....PART 1 AND LAB PART 2PART 1:Fundamental Properties of AC Circuits/LabRC and L/R CircuitsConsider the series L/R circuit below:What is the time constant of the circuit with S1 closed?What is the eventual steady-state current with S1 closed?What is the value of the circuit current at the first instant S1 is closed? (t = 0s)What is the value of the circuit current exactly one time constant after S1 is closed?How long after S1 closes will it take before the circuit current reaches its steady-state value?For the same circuit, assume that the switch S1 has been closed for more than five L/R time constants. If a 1MΩ resistor is placed across the terminals of the switch, calculate:The approximate time constant of the circuit with S1 open.The peak inductor voltage VL, when S1 is opened.The di/dt value the instant S1 is opened.How long it takes for the current to decay to zero after S1 is opened (approximately).Series L/R Circuit:Consider the series RC circuit below:Assume C1 is completely discharged with S1 in the position shown. If S1 is moved to the top position, how long will it take for the capacitor voltage to reach3V6V15V20VAssume that C is completely discharged with S1 in the position shown. If S1 is moved to the top position, how much is the resistor voltage at the following time intervals?t = 0 st = 4.5 mst = 10 mst = 15 mst = 25 msAssume that C is fully charged with S1 in the top position. If S1 is moved to the bottom position (as shown), how long with it take the capacitor to discharge to:4 V8 V12 V18 VSeries RC Circuit:LAB PART 2:Fundamental Properties of AC Circuits/LabSeries L/R and RC CircuitsWatch the videoWeek 6 Video Lecture – Multisim Series RLConstruct the series L/R and RC circuits from this week’s assignment in MultiSIM and perform Transient Analysis on each circuit to confirm your calculations. Use a 5% tolerance for all of the components. Capture a screenshot of the output of the analysis to confirm your calculations. Create a table to demonstrate your expected and measured values.Include a discussion of the following:Differences between the calculations and the simulations.How would you go about designing a circuit with an applied voltage of 24V and a resistor of 1kohms such that the current in the circuit starts out at 0A and reaches 24mA in 2 seconds?How would you go about designing a circuit with an applied voltage of 24V and a resistor of 1kohms such that voltage starts out at 0V and reaches 24V in 2 seconds?
Similar Content
Branches , nodes and ground
. Using CHROME, Goto http://www.everycircuit.com 2. Create an account (use Chrome option). Your instructor will provid...
pavement homework
Please answer correctly with your own value. And stay away from plagiarism. ...
SELC Comparison
Discuss the different SELC models (Waterfall, Spiral, V, Agile)Compare aand Contrast the Waterfall versus AgileDiscuss wha...
Discussion 2
By now you should have viewed the videos of three lectures (1A, 1B, & 1C) along with three power point shows (1A, 1B, ...
SFTY 330 Virtual Aircraft Systems Lab Report
Introduction to Nondestructive Testing
(NDT)
This presentation was developed by the Collaboration for NDT Education to pr...
concrete questions
I need you to do these 6 concrete questions they are very easy....
Ass 3 Me301
...
Chemical Engineering
“An oil spill you've never heard of could become one of the biggest environmental disasters in the US” is a documentar...
Integrity Of Chassis
Article Title: Analysis of integrity of chassis structure contend defect Author(s): Agenor Dias de Meira Junior, Márcio W...
Related Tags
Book Guides
The Power of Habit - Why We Do What We Do in Life and Business
by Charles Duhigg
Homo Deus
by Yuval Noah Harari
The Lord of the Flies
by William Golding
The English Patient
by Michael Ondaatje
The Restless Wave
by John McCain
Unf*ck Yourself
by Gary John Bishop
The Metamorphosis
by Franz Kafka
Untamed
by Glennon Doyle
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
IT 242 Saudi Electronic University Software Engineering Case Study
No Plagiarism , No Matching will be acceptable .No pictures containing text will be acceptable and will be considered plag ...
IT 242 Saudi Electronic University Software Engineering Case Study
No Plagiarism , No Matching will be acceptable .No pictures containing text will be acceptable and will be considered plagiarism.- No short answer as it's not acceptable for this assignment the answer should be sufficient proper examples and explanations for each questions.
University of Kentucky Financial Crisis Discussion
1)Reflect on the assigned readings for the week. 350 words Respond to the following prompts: “What do I feel are the mos ...
University of Kentucky Financial Crisis Discussion
1)Reflect on the assigned readings for the week. 350 words Respond to the following prompts: “What do I feel are the most important aspects of my learning in the chapters this week?” and “What about this learning was really worthy of my time and understanding?” Then explain how important it is in society or business.
Also, provide a graduate-level response to each of the following questions:
a)Pick a major U.S. industry, such as automobiles or computers, and discuss the lapses in technology and innovation on the domestic front that permitted foreign competitors to get a foothold and, in some cases, a dominant share of the market. Who or what do you think was to blame for this situation?
b)In the mid-1980s, General Motors undertook a $5 billion program to introduce robotics and computer-integrated manufacturing techniques into many of its assembly plants. The results were disappointing, to say the least. Enormous technical problems dogged the program from the beginning, and the ultimate gains in productivity were decidedly modest. What do you think went wrong? Why? From the long-term perspective, was the automation program a good idea?
2)Identify a new product that is based on an innovation in technology, and draw up a strategic technical plan for its development. Be sure to discuss the risk factors at each stage, and indicate how you would deal with each.
EEGR 390 Job Shop Scheduling Program Model
Please do the attached individually. This will solidify your understanding of the related statistical concepts of the Job ...
EEGR 390 Job Shop Scheduling Program Model
Please do the attached individually. This will solidify your understanding of the related statistical concepts of the Job Shop Models. For this assignment you will submit the following:Listing of program codeOutput from compilation and execution of codeSummary of results
IT 304 Southern New Hampshire University Millennia HealthCenter Implementation Plan
CompetencyIn this project, you will demonstrate your mastery of the following competency:Develop an implementation planSce ...
IT 304 Southern New Hampshire University Millennia HealthCenter Implementation Plan
CompetencyIn this project, you will demonstrate your mastery of the following competency:Develop an implementation planScenarioAs in the previous project, Millennia HealthCenter will be implementing a new software system. The system requirements specification (SRS) has been reviewed and approved by all stakeholders. At this stage in the process of implementing this system, you have been assigned the role of systems analyst. Now your job is to create the system’s implementation schedule and plan. As you develop this plan, you will also have to determine a life cycle for the system’s development because the team is undecided on which life cycle to choose.DirectionsReview the business case that describes the implementation of a software system. It is the same case used in Project One.Be sure to read through the entire case again. You want to avoid missing any valuable information that should be considered in an implementation plan.Review the feedback that you received from your instructor on Project One. You should use your SRS to make decisions on how you would implement the system.Develop an implementation schedule and plan for the software system outlined in the business case. You may use MS Project or Microsoft Excel to develop your schedule and insert it into the Implementation Plan Template, as it is part of your implementation plan. Your implementation schedule and plan must include the following:An introduction that explains the purpose of the implementation plan and the overview of the system that is being implementedThe phases, such as:ScopeAnalysisRequirementsDesignDevelopmentTestingTrainingDocumentationPilotDeploymentPost implementationThe tasks that occur within a phase, such as:RequirementsResponsibilitiesDuties that need to be completed throughout the implementation processThe resources, such as:Personnel involved with the projectHardware and software neededProper training for personnel involved with the projectThe durations and estimates to specify how long you think each task will take, such as:Implementation time that it will take to complete each taskWhen each task is estimated to be completed, including start and finish datesThe task dependencies, such as:Tasks that need to be completed prior to moving on to another taskTasks that need to be completed at the same time (parallel tasking)Two to three ways in which you will monitor performance of the system and the user experience, such as:Access times that indicate a lag timeHelp desk complaints and ticketsSystem downtimeSystem availabilityDatabase inquiriesWhat to SubmitTo complete this project, you must submit the following:Implementation PlanUpload your implementation plan, using the Implementation Plan Template, in .doc or PDF format. Your plan could include a graphic of your implementation schedule, which you can create using MS Project or Microsoft Excel. If you’re unable to include your schedule in your plan, you should upload it as a separate file.Supporting MaterialsThe following resource(s) may help support your work on the project:Business Case for Millennia HealthCenterThis resource is the same business case that you used to complete Project One. It emphasizes the importance of understanding the organization and the system that will be implemented. Without understanding the situational context, you will find it more difficult to have a solid understanding of how the system should be implemented.Personnel and Staffing CostsThis document includes a list of potential personnel that you might decide to employ on the project, plus the average costs of each role. This resource will help you develop a minimum budget.MS Project ProfessionalThis resource will help you navigate through MS Project. If you decide to use MS Project, it is recommended that you use the Software Development Plan.Microsoft ExcelThis resource will help you navigate through Excel. Since there is no set template, you will have to be sure you include all of the requirements of the implementation plan.Implementation Plan TemplateUse this template to complete Project Two. The template will guide you through all of the sections that you may find in a project’s implementation plan. This file will download as a .doc file onto your computer. As you make progress on it, be sure to save it every now and then.
ISOL 631 Academy of Computer Education DoD Information System Report
Purpose:This course project is intended to assess your ability to identify, design, and organize information technology (I ...
ISOL 631 Academy of Computer Education DoD Information System Report
Purpose:This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.
Q1. Submit a bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains.
You should consider the following laws in the report
Department of Defense Instruction (DoDI) issues plans and implementations of policies that allocates relations required to contribute security situational awareness as identified by the DoD policies and agreements.
undefined
National Institute of Standards and Technology (NIST) is a known cybersecurity framework used to provide guidance on what processes and controls should be implemented. These standards are in place to protect services and consumers of information systems.
North American Electric Reliability Corporation (NERC) has cyber security standards focused on ensuring the reliability of the Bulk Electric System (BES).
Federal Information Processing Standards (FIPS) Publications are guidelines exercised by all agencies to classify, manage, operate, and control security requirements of all information and information systems collected or maintained to for or by the federal government.
International Standards Organization (ISO) a certified security standard for the creation and maintenance of assets and requirements to ensure the Confidentiality, Integrity, and Availability (CIA) of all Information Technology (IT) and Information Systems (IS).
You should add more policies in different domains
For example, some common standards that organizations deploy to control and reduce risk for the user domain includes:
Acceptable Use Policy – the UAP needs to cover all users and the way they will protect access and discloser of information.
Remote Access – access through virtual private networks (VPN) will be limited to a few individuals and data deemed critical will not be allowed across a VPN.
User Account Requests – all new accounts will be processed by requests that are signed off by hiring manager and human resources. The accounts will then be partitioned to active directory.
User Accounts Disable – all users accounts will be closed withing 15 days of termination. Users that go on long term leave will have accounts disabled until return to duty.
Personal Equipment Usage – no critical information should be accessed through any device except company approved devices.
Email – all critical and sensitive labeled information shall not used in any email except corporate approved.
Passwords – all passwords must be of minimum length (9 characters) and include letters, numbers, and special characters.
PWD (Password) Change – all passwords will be changed every 60 days.
Complete Multism Circuits and Lab Work NEED A MULTISM EXPERT
COMPLETE TWO PART ASSIGNMENT....PART 1 AND LAB PART 2PART 1:Fundamental Properties of AC Circuits/LabRC and L/R CircuitsCo ...
Complete Multism Circuits and Lab Work NEED A MULTISM EXPERT
COMPLETE TWO PART ASSIGNMENT....PART 1 AND LAB PART 2PART 1:Fundamental Properties of AC Circuits/LabRC and L/R CircuitsConsider the series L/R circuit below:What is the time constant of the circuit with S1 closed?What is the eventual steady-state current with S1 closed?What is the value of the circuit current at the first instant S1 is closed? (t = 0s)What is the value of the circuit current exactly one time constant after S1 is closed?How long after S1 closes will it take before the circuit current reaches its steady-state value?For the same circuit, assume that the switch S1 has been closed for more than five L/R time constants. If a 1MΩ resistor is placed across the terminals of the switch, calculate:The approximate time constant of the circuit with S1 open.The peak inductor voltage VL, when S1 is opened.The di/dt value the instant S1 is opened.How long it takes for the current to decay to zero after S1 is opened (approximately).Series L/R Circuit:Consider the series RC circuit below:Assume C1 is completely discharged with S1 in the position shown. If S1 is moved to the top position, how long will it take for the capacitor voltage to reach3V6V15V20VAssume that C is completely discharged with S1 in the position shown. If S1 is moved to the top position, how much is the resistor voltage at the following time intervals?t = 0 st = 4.5 mst = 10 mst = 15 mst = 25 msAssume that C is fully charged with S1 in the top position. If S1 is moved to the bottom position (as shown), how long with it take the capacitor to discharge to:4 V8 V12 V18 VSeries RC Circuit:LAB PART 2:Fundamental Properties of AC Circuits/LabSeries L/R and RC CircuitsWatch the videoWeek 6 Video Lecture – Multisim Series RLConstruct the series L/R and RC circuits from this week’s assignment in MultiSIM and perform Transient Analysis on each circuit to confirm your calculations. Use a 5% tolerance for all of the components. Capture a screenshot of the output of the analysis to confirm your calculations. Create a table to demonstrate your expected and measured values.Include a discussion of the following:Differences between the calculations and the simulations.How would you go about designing a circuit with an applied voltage of 24V and a resistor of 1kohms such that the current in the circuit starts out at 0A and reaches 24mA in 2 seconds?How would you go about designing a circuit with an applied voltage of 24V and a resistor of 1kohms such that voltage starts out at 0V and reaches 24V in 2 seconds?
Earn money selling
your Study Documents