With accordance with the first law of thermodynamics, an 850kW single-effect absorption chiller… 1 answer below »

Can you please solve the attached Questions for:

1) Withaccordance with the first law of thermodynamics, an 850kW single effect absorption chiller with a COP of 0.84 will require a heat source of _______ kW and a heat rejection sink of _______ kW

2) Ifyou were to change the absorption chiller specification to a double effect absorption chiller with a COP of 1.33, the heat source requirement would change to be ______ kW to power the cycle and a heat rejection sink of _______ kW would be needed.

3)You have installed a large absorption chiller that provided a chilled water output of 4152kWh in the last 12 months. The electric chiller that this machine replaced operated at an average COP of 4.3. How much electricity did you save in the last 12 months?

Attachments:

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Select a research nursing article that addresses the effects of substance abuse on the individual,..

Select a research nursing article that addresses the effects of substance abuse on the individual, the family, or the community

Please respond to one (1) of the following discussion prompts below:

Select a research nursing article that addresses the effects of on the individual, the family, or the community. Post a brief summary of the article.

Choose one commonly abused substance and present a summary of the prevalence of the problem and the local resources for individuals, families or the community

Your response should be 50 – 100 words.

Please respond to at least one (1) of your classmates.

To begin the discussion, click on the “Click to Launch” link above, and then click “Create Thread”.

 

……………… Added to cart

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Let (Kgen, Enc, Dec) be a semantically secure encryption scheme,that encrypts messages of length l.

Let (Kgen, Enc, Dec) be a semantically secure encryption scheme,that encrypts messages of length l. Show that this scheme alsosatisfies the following properties. 1. Sample a random key K ← Kgen, and encrypt a random message M← {0, 1} l to obtain ciphertext C ← EncK(M). Show that no efficientattacker, given C, can recover the first bit M1 of the message Mwith probability 1. 2. Sample a random key K ← Kgen, and encrypt two random messagesM1 ← {0, 1} l and M2 ← {0, 1} l to obtain two ciphertexts C1 ←EncK(M1) and C2 ← EncK(M2). Show that no efficient attacker, givenC1, C2, can recover the bit of information of whether M1 > M2 orM2 . . .

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

What is the compound symmetry assumption What is sphericity What What is the compound symmetry…

What is the compound symmetry assumption What is sphericity What

What is the compound symmetry assumption? What is sphericity? What information from the SPSS printout helps us to evaluate whether the sphericity assumption is violated?

What is the compound symmetry assumption What is sphericity What

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Scenario: You have been hired as an IT consultant by an entrepreneur starting a small advertising… 1 answer below »

Scenario: You have been hired as an IT consultant by an entrepreneur starting a small advertising company called MilleniAds. As a start-up, your client’s

company is relatively small and has a limited budget. There are only 10 employees, including a few creative directors, graphic designers, sales staff, a financial

accountant, and an office administrator, with the entrepreneur acting as CEO. The current IT budget cannot exceed $25,000 and ideally should come in as far

under that number as possible. MilleniAds will produce customized sales flyers, brochures, and other branded items, such as letterhead and business cards, that

apply a youthful, fresh perspective targeting millennial demographics. Therefore, the company needs the ability to store and manipulate digital images and to

produce physical copies of their products for their clients. The CEO wants to keep track of inventory, sales, and expenses digitally, but she does not anticipate

having very complex records for the first year. She projects having only a dozen or so accounts but hopes to scale up in the coming years. It would be ideal to

have a simple and user-friendly system for sharing information and files between employees. Many of the employees are millennials themselves who have

indicated that their current desktop PCs are limiting their capabilities and that they prefer using their phones and other mobile devices for their professional and

personal responsibilities. Two of the 10 employees will operate primarily outside of the office, soliciting business from regional firms, and they will need to

access company information while on the road, in their home offices, and at customer sites.

Beyond the specific information given above, you have the ability to fill in the gaps with assumptions or additional details that will make your final project unique

and meaningful to you. If you have any questions, reach out to your instructor for guidance

Attachments:

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Because some college majors pay nearly twice as much as others,why would students pursuing their rat

Because some college majors pay nearly twice as much as others,why would students pursuing their rational self-interest choose alower paying major? What can you learn about the payoff to college education forboth women and men? . . .

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Describe the theory of knowledge called skepticism. Consider the skeptic’s charge that we can… 1 answer below »

SELECT ONE either TOPIC A OR TOPIC B

Topics for your Essay, Choose A or B

Essay Length tips–To answer these topics completely, it takes about 2 pages—8-10 paragraphs. Use the topic questions and the scoring rubric to see if your draft responds fully to all parts of the question. A complete, thoughtful answer is more important than word count.

Topic A

In this essay you will address the controversy between free will and determinism. You will go deeper into the problem of determinism by choosing whether it is the predictabilityor the unpredictability of our actions that poses a bigger threat to free will. Using passages from the textbook, explain in detail what determinism is and why determinism threatens the idea of free will.

Now consider these two opposite points of view about our ability to predict behavior:

  1. Everything you do is predictable to those who know you well. This predictability means your life is determined by choices beyond your control—Paraphrase from Vaughn, p.258
  2. “He sat a long time and he thought about his life and how little of it he could have foreseen and he wondered for all his will and all his intent how much of it was his doing.”—Cormac Mc Carthy (reprinted in Vaughn, p.255)

Explain what these two points of view mean and then give your own reasoned opinion about which point of view is correct. Defend your answer.

Topic B

Describe the theory of knowledge called skepticism. Consider the skeptic’s charge that we can neverbe confident about the reliability of our normal sources of knowledge (perceptions, memory, introspection, and reasoning.) Describe why and how, for each of the 4 sources mentioned, the source is unreliable. Use examples to show your understanding.

If a source of knowledge is unreliable, it means these sources can trick us into believing falsehoods. Does it follow from the fact that we are sometimes mistaken when we rely on these sources that we are always mistaken? In other words, once we admit is possible that we are mistaken, does that mean that we need to admit that we might neverbe correct? How would you respond to the skeptic?

ATTATCHED BELOW IS THE BOOK AS A PDF LINKfile:///C:/Users/witze/Downloads/Philosophy%20Here%20And%20Now%20Powerful%20Ideas%20In%20Everyday%20Life%203rd%20Edition%20By%20Lewis%20Vaughn.pdf

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

please help me this problem while following on the assignmensts’ instruction . thanks Western Jeans

please help me this problem while following on the assignmensts’ instruction . thanks


Western Jeans Control Chart Problem The data for the Westem Jeans control chart problem is as follows. The sample size of eac Western Jeans Control Chart Problem The data for the Westem Jeans control chart problem is as follows. The sample size of each sample is 100. Number of Defectives Sample LO CUAN Proportion Defective 0.06 0.00 0.04 0.10 0.06 0.04 0.12 0.10 0.08 0.10 0.12 0.10 0.14 0.08 0.06 0.16 0.12 0.14 0.20 0.18 2.00 12 13 20 20 18 Total You can use Excel for this problem. Don't forget to add your name to your assignment. 1. Calculate the center line, the upper control limit, and the lower control limit using the data above. Show your work by including the equations you are using for each. If you can't create a square root sign, use another symbol such as a “v” in the place where a square root sign would go or just indicate “square root” where it would go. 2. Plot all the points on a control chart, and draw your three lines. 3. Answer the following question: Is this process in control? Why or why not? 4. Is the graph trending in any particular direction? What does this tell you?

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Lazy procedure linkage with the PLT Programs that use shared libraries generally contain calls to a.

Lazy procedure linkage with the PLT Programs that use shared libraries generally contain calls to a lot of functions. In a single run of the program many of the functions are never called, in error routines or other parts of the program that aren’t used. Furthermore, each shared library also contains calls to functions in other libraries, even fewer of which will be executed in a given program run since many of them are in routines that the program never calls either directly or indirectly.

To speed program startup, dynamically linked ELF programs use lazy binding of procedure addresses. That is, the address of a procedure isn’t bound until the first time the procedure is called.

ELF supports lazy binding via the Procedure Linkage Table, or PLT. Each dynamically bound program and shared library has a PLT, with the PLT containing an entry for each non-local routine called from the program or library, Figure 3. Note that the PLT in PIC code is itself PIC, so it can be part of the read-only text segment.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"