The initial latitude for S 760-15'-41" E 210.58' is: -50.0112 The residual for the latitudes is -0.0148 The sum of the distances around the traverse is 769.35' What is the corrected latitude? +50.0260 +50.0153 +49.9964 -50.0071

Answers

Answer 1

The corrected latitude is +50.0260, which is closest to the answer choice of +50.0153.

To find the corrected latitude, we need to use the residual and adjust the initial latitude.
Initial latitude: -50.0112
Residual: -0.0148
Corrected latitude = Initial latitude + Residual
Corrected latitude = -50.0112 + (-0.0148)
Corrected latitude = -50.0260 (note that this is a negative value)
However, we need to express the latitude in a positive value, so we take the absolute value of the corrected latitude:

Corrected latitude = | -50.0260 |
Corrected latitude = +50.0260

Learn more about  latitude: https://brainly.com/question/31497350

#SPJ11


Related Questions

what are the three categories of the detect (de) function of the nist cybersecurity framework?
a.restoration, corrections to procedures, communication
b.planning, mitigation, corrections to systems
c.manage, protect, maintain
d.analysis, observation, detection

Answers

The three categories of the detect (de) function of the nist cybersecurity framework are analysis, observation, detection. Option D

What is detect function?

The detect (DE) function is one of the five functions in the NIST Cybersecurity Framework, which provides guidance for organizations to improve their cybersecurity posture.

The DE function is designed to identify the occurrence of a cybersecurity event, whether it is a potential incident or an actual one, by continuously monitoring, analyzing, and detecting anomalies or events that may indicate a security breach.

The three categories of the DE function are:

AnalysisObservationDetection

Overall, the DE function is essential for organizations to detect and respond to cybersecurity events effectively. By implementing the DE function, organizations can improve their ability to detect and respond to security incidents promptly, reducing the potential impact of these incidents on their business operations and reputation.

Read more about cybersecurity framework at: https://brainly.com/question/28112512

#SPJ1

A manufacturing plant has a 25 KVA single phase motor with a lagging power factor of 0.85 and this motor gets its power from a nearby a.c. voltage supply. A power factor correction capacitor of 12 kVar is also connected parallel to the motor.

(a) Calculate the real power (kW) consumed by the motor (3)
(b) Calculate the input apparent power (S) taken from the supply (14)
(c) The power factor is to be corrected or improved from 0.85 to 0.99 lagging. Calculate the rating (in Vars) of the capacitor required for this improvement. (8)

Answers

(a) The real power (kW) consumed by the motor can be calculated using the formula:

P = S x pf

where P is the real power in kilowatts (kW), S is the apparent power in kilovolt-amperes (kVA), and pf is the power factor.

Given that the motor has a rating of 25 kVA and a power factor of 0.85 lagging, we have:

P = 25 kVA x 0.85 = 21.25 kW

Therefore, the real power consumed by the motor is 21.25 kW.

(b) The input apparent power (S) taken from the supply can be calculated using the formula:

S = P / pf

where P is the real power in kilowatts (kW), and pf is the power factor.

Given that the motor has a rating of 25 kVA and a power factor of 0.85 lagging, we have:

S = 21.25 kW / 0.85 = 25 kVA

Therefore, the input apparent power taken from the supply is 25 kVA.

(c) The rating (in Vars) of the capacitor required to improve the power factor from 0.85 to 0.99 lagging can be calculated using the formula:

C = (P x (tan θ1 - tan θ2)) / V^2

where C is the capacitance in farads (F), P is the real power in watts (W), θ1 is the original power factor angle (cos^-1(pf1)), θ2 is the final power factor angle (cos^-1(pf2)), and V is the voltage in volts (V).

Given that the motor has a rating of 25 kVA, a power factor of 0.85 lagging, and the desired power factor is 0.99 lagging, we have:

P = 21.25 kW = 21,250 W
θ1 = cos^-1(0.85) = 31.78°
θ2 = cos^-1(0.99) = 8.11°
V = unknown

To find the voltage, we need to use the apparent power formula:

S = V x I

where S is the apparent power in volt-amperes (VA), V is the voltage in volts (V), and I is the current in amperes (A).

Given that the input apparent power is 25
Sure, I can help you with those calculations.

(a) To calculate the real power consumed by the motor, we can use the formula:

Real Power (kW) = Apparent Power (kVA) * Power Factor

Given that the motor has a power factor of 0.85 and an input power of 25 KVA, we can find the real power consumption as follows:

Real Power (kW) = 25 * 0.85 = 21.25 kW


(b) To calculate the input apparent power taken from the supply, we can use the formula:

Apparent Power (kVA) = Voltage (V) * Current (A) / 1000

However, since we are not given the current drawn by the motor, we cannot calculate the apparent power directly. If we are given the voltage though, we can use Ohm's law to find the current and then use the above formula. Let me know if you have that information.

(c) To improve the power factor from 0.85 to 0.99 lagging, we need to add a capacitor that will generate reactive power that cancels out the reactive power from the motor. The formula for the reactive power generated by a capacitor is:

Reactive Power (vars) = Capacitance (F) * Voltage (V)^2 * 2 * pi * Frequency (Hz)

Since we are not given the frequency, we cannot directly solve for the capacitance. However, we can use the following formula to relate the new power factor to the old power factor, with the help of the required reactive power (in vars) to improve the power factor:

cos(phi1) = cos(phi2) - Qp / S

where cos(phi1) = initial power factor (0.85), cos(phi2) = final power factor (0.99), Qp = required reactive power, and S = input apparent power.

We were not given S, but let's say that it is equal to the real power consumption of the motor (21.25 kW), since we know that the power factor is lagging. Then we can solve for Qp as follows:

Qp = (cos(phi2)-cos(phi1)) * S = (0.99 - 0.85) * 21.25 = 2.98 kvar

Now that we have the required reactive power, we can use the formula for the reactive power generated by a capacitor to solve for the required capacitance:

Capacitance (F) = Qp / (Voltage (V)^2 * 2 * pi * Frequency (Hz))

Again, we don't have the frequency, but if we assume a typical value of 50 Hz for the power supply frequency, we can solve for the capacitance:

Capacitance (F) = 2.98 / (Voltage (V)^2 * 2 * pi * 50) = 1.9E-5 Vars / V^2

So the required capacitance is 1.9E-5 farads, or approximately 19 microfarads.

true or false in c , a class declaration provides a pattern for creating objects, but does not make any objects.

Answers

Answer:

False

Class declaration does provide a pattern for creating objects but does not make any objects

What is the spreading factor for a signal with 125 MHz bandwidth and 100 kbps data rate?
a) 0.125
b) 1.25
c) 1,250
e) 125
f) None of the above.

Answers

To find the spreading factor, you need to design the signal's bandwidth by the data rate and the answer comes out to be 1250.

Here's the step-by-step explanation:

Step 1: Identify the bandwidth and data rate.
Bandwidth = 125 MHz (which is equivalent to 125,000 kHz)
Data Rate = 100 kbps

Step 2: Calculate the spreading factor.
Spreading factor = Bandwidth / Data Rate
Spreading factor = 125,000 kHz / 100 kbps

Step 3: Simplify the result.
Spreading factor = 1,250

So, the correct answer is:
c) 1,250

To know more about design please refer:

https://brainly.com/question/17147499

#SPJ11

given q requests of the form (a, b), determine the number of retailers who can deliver to the city at the coordinate

Answers

Given q requests of the form (a, b), to determine the number of retailers who can deliver to the city at a specific coordinate, you will need to analyze each request to see if the retailer's delivery range includes that coordinate. The number of retailers satisfying this condition will be the answer.

To determine the number of retailers who can deliver to a city at a given coordinate, you need to look at the requests of the form (a, b) that match that coordinate. The coordinate would represent either the x or y value, depending on how the requests are structured. For example, if the requests are in the form of (x, y), then the coordinate would be either x or y.
You would need to loop through the q requests and check if the coordinate matches either the a or b value in each request. If it does, then that retailer can deliver to the city at that coordinate.
The number of retailers who can deliver to the city at the coordinate would be the count of matching requests. So you would need to keep a counter and increment it each time a matching request is found.
For example, if the coordinate is 5 and the requests are [(1, 5), (4, 6), (5, 8), (5, 9), (3, 5)], then the number of retailers who can deliver to the city at the coordinate would be 2 (because the second and third requests have a matching coordinate of 5).

To learn more about Analyze Here:

https://brainly.com/question/13019354

#SPJ11

determine the forces in members be and ce of the loaded truss. the forces are positive if in tension, negative if in compressio

Answers

To determine the forces in members BE and CE of the loaded truss, we need to first understand the concept of forces and trusses. A truss is a structure made up of interconnected elements (members) that work together to support loads. These members are subjected to different forces such as tension, compression, and shear.

In this case, we are given that the forces are positive if in tension and negative if in compression. This means that we need to analyze the truss to determine whether each member is in tension or compression and assign the appropriate sign to the force.
To analyze the truss, we can use the method of joints or method of sections. Let's use the method of joints to determine the forces in members BE and CE.
Starting at joint B, we can see that member AB is in compression since it is being pushed inward by the load. Therefore, the force in member AB is negative (-). Member BE is connected to joint B and joint E. We don't know the force in member BE yet, so let's move to joint C.
At joint C, we can see that member BC and member CE are both in tension since they are being pulled outward by the load. Therefore, the forces in members BC and CE are positive (+).
Now, let's go back to joint B and use the equilibrium equations to solve for the force in member BE. We know that the sum of forces in the x direction is zero, and the sum of forces in the y direction is zero. Therefore:
∑Fx = 0: -BE cos(45°) + CE cos(30°) = 0
∑Fy = 0: -BE sin(45°) - CE sin(30°) + 10 = 0
Solving these equations, we get:
BE = 7.95 kN (in tension)
CE = 5.77 kN (in tension)
Therefore, the force in member BE is positive (+) since it is in tension. The force in member CE is also positive (+) since it is in tension.

To learn more about truss click the link below:

brainly.com/question/29582407

#SPJ11

sort 3, 4, 68, 32, 46, 21, 80, 45, 39 using bin sort.

Answers

The sorted list using bin sort is: 0, 1, 2, 3, 4, 5, 6, 8, 9.

What is Bin Sort?

Bin sort, also known as bucket sort, is a sorting algorithm that works by distributing the elements of an array into a number of buckets. The elements are then sorted within each bucket, and the buckets are concatenated to produce the sorted array.

In this case, we can use the decimal digit in the tens place as the bucket index, since all the numbers are between 0 and 99. Here's how we can apply bin sort to the given list of numbers:

Create 10 empty buckets, labeled 0 through 9.

Iterate through the list of numbers, and for each number, do the following:

a. Determine the bucket index by dividing the number by 10 and rounding down (i.e., truncating).

b. Add the number to the corresponding bucket.

Iterate through the buckets in order (i.e., 0, 1, 2, ..., 9), and for each non-empty bucket, do the following:

a. Sort the elements in the bucket using any sorting algorithm (e.g., insertion sort).

b. Append the sorted elements to a new list.

The final sorted list is the concatenation of the sorted elements in each non-empty bucket.

Applying this algorithm to the given list of numbers, we get:

Create 10 empty buckets:

Bucket 0: []

Bucket 1: []

Bucket 2: []

Bucket 3: []

Bucket 4: []

Bucket 5: []

Bucket 6: []

Bucket 7: []

Bucket 8: []

Bucket 9: []

Add each number to the corresponding bucket:

Bucket 0: [3, 2, 1]

Bucket 1: []

Bucket 2: [4, 1]

Bucket 3: [6, 9]

Bucket 4: [5]

Bucket 5: []

Bucket 6: [8]

Bucket 7: []

Bucket 8: [0]

Bucket 9: []

Sort the elements in each non-empty bucket:

Bucket 0: [1, 2, 3]

Bucket 2: [1, 4]

Bucket 3: [6, 9]

Bucket 4: [5]

Bucket 6: [8]

Bucket 8: [0]

Concatenate the sorted elements from each non-empty bucket:

[0, 1, 2, 3, 4, 5, 6, 8, 9]

Therefore, the sorted list using bin sort is: 0, 1, 2, 3, 4, 5, 6, 8, 9.

Read more about bin sort here:

https://brainly.com/question/28167882

#SPJ1

Given G(jw) = 20(jw+50)/jw(jw+1)(jw+5) draw Bode plot of each component and the entire transfer function

Answers

The magnitude Bode plot of the transfer function G(jw) is as follows:
At low frequencies, the magnitude increases at a slope of +20 dB/decade due to the zero at w = -50.
At high frequencies, the magnitude decreases at a slope of -40 dB/decade due to the two poles at w = 0 and w = -5.
At the corner frequency w = 1, there is a downward phase shift of -180 degrees due to the pole at w = 1.


Bode plot: a graphical representation of a system's frequency response, showing magnitude and phase shift as a function of frequency.
Transfer function: a mathematical representation of the relationship between the input and output of a linear time-invariant system in the frequency domain.
Magnitude slope: the rate at which the magnitude of the transfer function changes with respect to frequency. A slope of +20 dB/decade means the magnitude increases by 20 dB for every decade increase in frequency, while a slope of -40 dB/decade means the magnitude decreases by 40 dB for every decade increase in frequency.
Zero: a frequency at which the transfer function has a value of zero. In the Bode plot, a zero appears as a positive slope at low frequencies.
Pole: a frequency at which the transfer function has a value of infinity or approaches infinity. In the Bode plot, a pole appears as a negative slope at high frequencies.
Phase shift: the difference in phase between the input and output of a system at a given frequency.

Learn more about bode plot here:

https://brainly.com/question/31276376

#SPJ11

A special type of problem occurs with a Branchinstruction, since the processor cannot immediately determinewhether or not the branch will be taken. The next instruction willbe fetched before the determination is made. In this case, if thebranch is taken, then the following instruction would not beexecuted, and the most recently fetched instruction must bediscarded, and replaced by the branch target. Possible solutions tothis problem are ______ and _________.A) Stall pipeline until determination is made; Predicting theBranch decision before it is actually made.B) Stall pipeline until determination is made; Bypassing withadditional hardware.C) Bypassing with additional hardware; A Branch instruction musalways be followed by a NOP.D) Bypassing with additional hardware; Predicting the Branchdecision before it is actually made.

Answers

The correct options to solve the problem that occurs with a Branch instruction are A) Stall pipeline until determination is made; Predicting the Branch decision before it is actually made, as per the given question.

When a branch instruction is executed, the processor cannot determine immediately whether or not the branch will be taken. The next instruction is fetched before the determination is made, but if the branch is taken, then the following instruction will not be executed, and the most recently fetched instruction must be discarded, and replaced by the branch target.

To solve this problem, one solution is to stall the pipeline until the determination is made, and the other solution is to predict the branch decision before it is actually made. Additionally, bypassing with additional hardware can also be used to solve this problem. This includes adding extra logic to predict and execute instructions ahead of time or to allow for multiple instructions to be executed at once. In general, the goal is to minimize the delay and ensure that the processor is able to execute instructions as efficiently as possible.

Option A is answer.

You can learn more about Branch instruction at

https://brainly.com/question/15263935

#SPJ11

create a function that takes in a vector and adds 10 random numbers to it. have the function return the vector.

Answers

This will return a new vector that includes the original vector elements plus 10 random numbers.

Here's an example function that takes in a vector and adds 10 random numbers to it:

```R
add_random_numbers <- function(my_vector) {
 new_vector <- c(my_vector, sample(1:100, 10))
 return(new_vector)
}
```

Here's what's happening in this function:

- `add_random_numbers` is the name of our function.
- `my_vector` is the name of the input parameter, which should be a vector.
- `new_vector` is a new vector that we'll create by adding 10 random numbers to `my_vector`.
- `sample(1:100, 10)` generates 10 random numbers between 1 and 100. You can adjust the range and number of random numbers as needed.
- `c(my_vector, sample(1:100, 10))` combines `my_vector` and the 10 random numbers into a new vector.
- `return(new_vector)` is the output of the function, which is the new vector with the added random numbers.

You can call this function with any vector as the input, like so:

```R
my_vector <- c(1, 2, 3)
add_random_numbers(my_vector)
# Output: [1] 1 2 3 25 77 33 11 98 40 7 90
```

Learn more about vector here:-

https://brainly.com/question/29740341

#SPJ11

Determine the absolute maximum bending stress in the 2-in.-diameter shaft. There is a journal bearing at A and a thrust bearing at B.

Answers

Assuming the shaft is made of a material with a yield strength of 60,000 psi, we can calculate the absolute maximum bending stress using the moment of inertia.

To determine the absolute maximum bending stress in the 2-in.-diameter shaft, we need to consider the loading conditions and the location of the journal and thrust bearings. Assuming the shaft is subjected to a pure bending moment, the maximum bending stress occurs at the point of maximum moment.
Since there is a journal bearing at A, the maximum moment occurs at the midpoint between A and B. We can calculate the maximum moment using the equation:
M_max = (F * L)/4
where F is the applied load, and L is the distance between the journal and thrust bearings. Since we don't have any information about the applied load, we can't calculate the exact value of M_max. However, we can say that the absolute maximum bending stress occurs at the point of maximum moment and can be calculated using the formula:
sigma_max = (M_max * c)/I
where c is the distance from the neutral axis to the outermost fiber, and I is the area moment of inertia of the cross-section.
For a solid 2-in.-diameter shaft, the area moment of inertia is:
I = (pi/4) * [tex]d^4[/tex] = [tex](pi/4)[/tex] * [tex]2^4[/tex] = 3.14 [tex]in^4[/tex]
Assuming the shaft is made of a material with a yield strength of 60,000 psi, we can calculate the absolute maximum bending stress using the above equation. However, without knowing the exact value of M_max, we can't provide a specific answer.

Learn more about bending stress here:

https://brainly.com/question/24282973

#SPJ11

2. What machine settings have important effects on the part properties in injection molding? 3. What two mechanisms provide heat to melt the polymer in the molding machine barrel? 4. Most industrial machines for injection molding are structured horizontally. What types of molded parts are typically produced on a vertical machine? 5. A three-plate mold for injection molding is more compl and expensive than a two-plate mold.

Answers

An injection molding machine (also spelled as injection moulding machine in BrE), also known as an injection press, is a machine for manufacturing plastic products by the injection molding process. It consists of two main parts, an injection unit and a clamping unit.

2. The machine settings that have important effects on part properties in injection molding include the temperature of the barrel, the pressure of the injection, the cooling time, and the holding pressure. These settings can affect the part's strength, dimensional accuracy, and surface finish.

3. The two mechanisms that provide heat to melt the polymer in the molding machine barrel are the electric heaters on the barrel and the mechanical shear of the polymer as it is pushed through the barrel.

4. While most industrial machines for injection molding are structured horizontally, vertical machines are typically used for producing insert-molded parts, overmolded parts, and parts with complex geometries.

5. A three-plate mold for injection molding is more complex and expensive than a two-plate mold because it has an additional plate that separates the runner system from the part cavity. This allows for more complex part designs and greater control over the injection process, but it also increases the cost and complexity of the mold.

learn more about injection molding here:

https://brainly.com/question/31055449

#SPJ11

. give data memory location assigned to pin registers of ports a-c for the atmega32

Answers

Memory locations assigned are

Port A: PINA=0x39, DDRA=0x3A, PORTA=0x3B

Port B: PINB=0x36, DDRB=0x37, PORTB=0x38

Port C: PINC=0x33, DDRC=0x34, PORTC=0x35

How to identify memory location assigned to the pin register?

Here are the memory locations assigned to the pin registers of ports A, B, and C for the ATmega32 microcontroller:

Port A:

PINA (Input Pins Address) Memory Location: 0x39

DDRA (Data Direction Register Address) Memory Location: 0x3A

PORTA (Output Pins Address) Memory Location: 0x3B

Port B:

PINB (Input Pins Address) Memory Location: 0x36

DDRB (Data Direction Register Address) Memory Location: 0x37

PORTB (Output Pins Address) Memory Location: 0x38

Port C:

PINC (Input Pins Address) Memory Location: 0x33

DDRC (Data Direction Register Address) Memory Location: 0x34

PORTC (Output Pins Address) Memory Location: 0x35

Note that these memory locations are specific to the ATmega32 microcontroller and may differ for other microcontrollers. Also, keep in mind that accessing these memory locations directly is usually not recommended and should be done with caution to avoid unintended consequences.

Learn more about memory location

brainly.com/question/16091648

#SPJ11

find an optimal parenthesization of a matrix-chain product whose sequence of dimensions is {5, 10, 12, 3, 7, 5, 6, 11} .

Answers

To find the optimal parenthesization of a matrix-chain product with the sequence of dimensions {5, 10, 12, 3, 7, 5, 6, 11}, we can use the dynamic programming approach.


An optimal parenthesization of A1… An must break the product into two expressions, each of which is parenthesized or is a single array. Assume the break occurs at position k. In the optimal solution, the solution to the product A1… Ak must be optimal.
First, we need to define a matrix M where M[i,j] represents the minimum number of scalar multiplications needed to compute the product of matrices Ai...j. We also need to define a matrix S where S[i,j] represents the index k such that the optimal parenthesization of Ai...j splits the product between Ak and Ak+1.
Using these matrices, we can fill in the values of M and S iteratively. For each i, we iterate over j such that j>i, and for each such pair (i,j), we iterate over k such that i<=k

learn more about  optimal parenthesization here:

https://brainly.com/question/29734387

#SPJ11

Find an optimal parenthesization of a matrix-chain product whose

sequence of dimensions is 5, 10, 3, 12, 5, 50 and 6.

which lines of code encapsulates the state machine's data?A) 23-37B) 4-9C) 40-52D) 13-15

Answers

The lines of code containing the data for a state machine, C) 40-52.

The data of the state machine is encapsulated by the lines of code in C) 40-52. This is where the potential states and transitions between them are specified. The variable "state" is defined and initialized to "INIT", which is the state machine's initial state. Lines 42-50 specify the potential states and their transitions based on the value of "state". The "case" statements explain the activities that must be done for each condition, while the "break" statements indicate the conclusion of each case. The "default" scenario is added to deal with any unexpected "state" values.

In contrast, lines A) 23-37 define the "event" functions that trigger state transitions, lines B) 4-9 initialize the GPIO pins, and lines D) 13-15 define the "main" function that runs the program. While these lines of code are important for the overall program, they do not encapsulate the state machine's data.

Therefore, the correct answer to the question is Option C. 40-52

Learn more from programming:

https://brainly.com/question/26497128

#SPJ11

One-dimensional lattice. You have a one-dimensional lattice that contains NA particles of type A and NB particles of type B. They completely fill the lattice, so the number of sites is NA+NB . Write an expression for the multiplicity W(NA,NB) , the number of distinguishable arrangements of the particles on the lattice.

Answers

C(NA+NB, NA) represents the binomial coefficient, and the factorial function (!) is used to calculate the number of ways to arrange the particles in the lattice. This expression gives you the total number of distinguishable arrangements for the given particles.

The expression for the multiplicity W(NA,NB) can be given by:

W(NA,NB) = (NA+NB)! / (NA! * NB!)

This formula represents the number of ways the particles of type A and B can be arranged on the one-dimensional lattice. The numerator (NA+NB)! represents the total number of ways to arrange all the particles on the lattice, while the denominator (NA! * NB!) accounts for the fact that the particles of type A and B are indistinguishable from each other. Therefore, we must divide by the factorial of the number of particles of type A and B to avoid overcounting.
The multiplicity W(NA, NB) for a one-dimensional lattice with NA particles of type A and NB particles of type B can be determined using the binomial coefficient formula. The expression for W(NA, NB) is:

W(NA, NB) = C(NA+NB, NA) = (NA+NB)! / (NA! * NB!)

Learn more about factorial function here:-

https://brainly.com/question/14938824

#SPJ11

what factors provide a lower bound on the period at which the system timer interrupts for preemptive context switching

Answers

The lower bound on the period at which the system timer interrupts for preemptive context switching is influenced by task granularity, overhead associated with context switching, system responsiveness, and hardware limitations.

The factors that provide a lower bound on the period at which the system timer interrupts for preemptive context switching are:

1. Task granularity: This is the amount of time a task takes to execute before reaching a point where it can be interrupted. Smaller task granularity requires a shorter period for the system timer to allow for effective preemptive switching.

2. Overhead associated with context switching: The overhead includes saving and restoring CPU registers and other system resources. A lower bound must be set to ensure that the time spent in context switching does not outweigh the benefits of preemptive switching.

3. System responsiveness: The period should be short enough to maintain desired system responsiveness. Shorter periods will provide better responsiveness at the cost of increased overhead due to more frequent context switching.

4. Hardware limitations: The hardware itself may impose restrictions on the minimum period for system timer interrupts, as some architectures have limitations on their timer resolution.

Learn more about hardware limitations.https://brainly.com/question/31497412

#SPJ11

The entries aij of matrix A are computed according to the formula aij =1 for i=1, j>1, aij=0 for i>1, j=1, aij = (ai-1,j + ai,j-1)/2 for i>1, j>1.
(i) Estimate the number of operations + that are necessary to compute aij. Apply dynamic programming approach discussed in class. Provide a justification of your estimate.
(ii) What are the minimal space resources you need for your computation, i.e. how many computed values do you need to keep in order to be able to compute aij?

Answers

Dynamic programming is a computer programming technique where an algorithmic problem is first broken down into sub-problems, the results are saved, and then the sub-problems are optimized to find the overall solution — which usually has to do with finding the maximum and minimum range of the algorithmic query.

(i) To estimate the number of operations necessary to compute aij, we can use a dynamic programming approach. For an n x m matrix A, there are (n-1) x (m-1) elements with i>1 and j>1. For each of these elements, we need one addition operation (ai-1,j + ai,j-1) and one division operation (/2). Therefore, the total number of operations required to compute aij for the entire matrix A is approximately 2 * (n-1) * (m-1).

The dynamic programming approach is suitable for this problem because it allows us to store and reuse the results of previously computed operations to find aij efficiently. Instead of computing each element from scratch, we can use the values of the previous row (i-1) and previous column (j-1) to compute the current element, reducing the overall number of operations.

(ii) The minimal space resources required for the computation of aij can be minimized by storing only the current row and the previous row (since we need both ai-1,j and ai,j-1 for the computation). Therefore, we need to keep 2 * m computed values in memory to calculate aij, where m is the number of columns in matrix A. This approach minimizes the space requirements while still allowing for efficient computation of the matrix elements.

learn more about dynamic programming here:

https://brainly.com/question/30868654

#SPJ11

1. write a python program to construct the following pattern, using a nested for loop. *************************

Answers

Hi! I'd be happy to help you write a Python program that constructs the given pattern using a nested for loop. Here's the code:

```python
for i in range(1, 6):
   for j in range(i):
       print('*', end='')
   print()

for i in range(4, 0, -1):
   for j in range(i):
       print('*', end='')
   print()
```

This program uses two nested for loops. The first loop generates the increasing pattern, while the second loop generates the decreasing pattern. The `print('*', end='')` statement prints an asterisk without adding a newline, and the `print()` statement creates a newline after each row.

To know more about nested loops in Python, please visit:

https://brainly.com/question/22057897

#SPJ11

Problem 2 Preventing fatigue crack propagation in aircraft structures is an important element of aircraft safety. An engineering study to investigate fatigue crack in n = 9 cyclically loaded wing boxes reported the following crack lengths (in mm): 2.13, 2.96, 3.02, 1.82, 1.15, 1.37, 2.04, 2.47, and 2.60. (a) Calculate the sample mean. (b) Calculate the sample variance and sample standard deviation. (c) Prepare a dot diagram of the data.

Answers

0.810 mm² and 0.90 mm is  the sample variance and sample standard deviation, 2.18 mm is the sample mean, given below Each dot represents an observation and their position on the number line represents their corresponding value. This type of diagram allows us to see the distribution of the data and identify any outliers.

To ensure aircraft safety, preventing fatigue crack propagation is crucial. In an engineering study focused on this issue, the lengths of fatigue cracks in 9 cyclically loaded wing boxes were measured. The recorded lengths, in mm, were as follows: 2.13, 2.96, 3.02, 1.82, 1.15, 1.37, 2.04, 2.47, and 2.60.
To analyze this data, we need to calculate some statistical measures.
(a) To determine the sample mean, we add up all the crack lengths and divide by the sample size:
Mean = (2.13 + 2.96 + 3.02 + 1.82 + 1.15 + 1.37 + 2.04 + 2.47 + 2.60) / 9 = 2.18 mm
Therefore, the sample mean is 2.18 mm.
(b) To calculate the sample variance, we need to first calculate the deviation of each observation from the mean:
Deviation of 2.13 = 2.13 - 2.18 = -0.05
Deviation of 2.96 = 2.96 - 2.18 = 0.78
Deviation of 3.02 = 3.02 - 2.18 = 0.84
Deviation of 1.82 = 1.82 - 2.18 = -0.36
Deviation of 1.15 = 1.15 - 2.18 = -1.03
Deviation of 1.37 = 1.37 - 2.18 = -0.81
Deviation of 2.04 = 2.04 - 2.18 = -0.14
Deviation of 2.47 = 2.47 - 2.18 = 0.29
Deviation of 2.60 = 2.60 - 2.18 = 0.42
Next, we square each deviation and add them up:
Variance = [(-0.05)² + (0.78)² + (0.84)² + (-0.36)² + (-1.03)² + (-0.81)² + (-0.14)² + (0.29)² + (0.42)²] / 8
Variance = 0.810 mm²
Finally, we can calculate the sample standard deviation as the square root of the variance:
Standard Deviation = √(0.810) = 0.90 mm
Therefore, the sample variance is 0.810 mm^2 and the sample standard deviation is 0.90 mm.
(c) To create a dot diagram, we simply plot each observation on a number line. Here is a dot diagram of the fatigue crack length data:
1.15 •
1.37 •
1.82 •
2.04 •
2.13 •
2.47 •
2.60 •
2.96 •
3.02 •
Each dot represents an observation and their position on the number line represents their corresponding value. This type of diagram allows us to see the distribution of the data and identify any outliers.

To learn more about Standard deviation Here:

https://brainly.com/question/13905583

#SPJ11

c write a program that reads a string that consists of alphabet letters only and display the number of occurences of every letter

Answers

Here is a C program that reads a string of alphabets and displays the number of occurrences of each letter:

The Program

#include <stdio.h>

#include <ctype.h>

int main() {

   char str[100];

   int freq[26] = {0};

   int i, index;

   printf("Enter a string: ");

   fgets(str, sizeof(str), stdin);

   for (i = 0; str[i] != '\0'; i++) {

       if (isalpha(str[i])) {

           index = tolower(str[i]) - 'a';

           freq[index]++;

       }

   }

   printf("Letter frequency:\n");

   for (i = 0; i < 26; i++) {

       if (freq[i] != 0) {

           printf("%c: %d\n", i + 'a', freq[i]);

       }

   }

   return 0;

}

Explanation:

We declare a character array str to store the input string and an integer array freq of size 26 to store the frequency of each letter of the alphabet.

We prompt the user to enter a string using the printf function and read the input string using the fgets function.

We loop through the input string str and check if the current character is an alphabet using the isalpha function. If it is an alphabet, we convert it to lowercase using the tolower function and calculate the index of the corresponding letter in the freq array by subtracting the ASCII value of 'a'.

We then increment the frequency of that letter in the freq array.

Finally, we loop through the freq array and print the frequency of each letter that has occurred at least once.

Note that this program only counts the occurrence of alphabets and ignores all other characters

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

calculate the minimum safety factor for the cylinder if it is made of class 50 gray cast iron with a tensile ultimate strength (ut)of 362 mpa and a compressive ultimate strength (uc)of -1130 mpa

Answers

The minimum safety factor for a cylinder depends on the loads and stresses it will be subjected to, as well as the material properties.

We can calculate the maximum allowable stresses for the cylinder based on the ultimate strengths of the material and use a typical safety factor of 2 to arrive at a rough estimate for the minimum safety factor. For gray cast iron with a tensile ultimate strength (UT) of 362 MPa, the maximum allowable stress would be UT/2 = 362/2 = 181 MPa.

For gray cast iron with a compressive ultimate strength (UC) of -1130 MPa, the maximum allowable stress would be UC/2 = -1130/2 = -565 MPa (note the negative sign due to the compressive nature of the stress).

Using a safety factor of 2, we can calculate the maximum allowable stresses for the cylinder as follows:

For tensile stresses: 181/2 = 90.5 MPa

For compressive stresses: -565/2 = -282.5 MPa

Again, without specific information about the loads and stresses the cylinder will be subjected to, we cannot provide an exact minimum safety factor. However, a common rule of thumb is to use a safety factor of 2 to 3 for static loads and a safety factor of 3 to 4 for dynamic loads.

Learn more about tensile ultimate strength (UT) here:

https://brainly.com/question/15282669

#SPJ11

A three-phase rectifier is supplied by a 240-V rms line-to-line 60-Hz source. The load is an 80-Ω resistor. Determine (a) the average load current, (b) the rms load current, (c) the rms source current, and (d) the power factor.

Answers

A rectifier is an electrical device that converts alternating current (AC) to direct current (DC). RMS stands for root-mean-square and is a measure of the effective value of an AC waveform. Current refers to the flow of electrical charge through a circuit.

(a) To determine the average load current, we first need to calculate the peak voltage of the 240-V rms line-to-line source. The peak voltage can be found by multiplying the rms voltage by the square root of 2, which gives us:
240 x sqrt(2) = 339.4 V (peak)
The load is an 80-Ω resistor, so the average load current can be found using Ohm's Law, which states that:
I = V / R
Where I is the current, V is the voltage, and R is the resistance. Substituting the values, we get:
I = 339.4 / 80 = 4.24 A (average load current)
(b) The rms load current can be found by dividing the average load current by the square root of 2, which gives us:
4.24 / sqrt(2) = 3 A (rms load current)
(c) To determine the rms source current, we need to know the power factor of the circuit. The power factor is the ratio of real power (the power that is actually consumed by the load) to apparent power (the product of voltage and current). For a resistive load like the 80-Ω resistor, the power factor is 1, which means that all of the power is consumed by the load and none is lost in the circuit. Therefore, the rms source current is equal to the rms load current, which is 3 A.
(d) The power factor of the circuit is 1, as mentioned above.

To learn more about circuit click the link below:

brainly.com/question/28305485

#SPJ11

Why are friction brake used on electrical motors? Holding a motor position. Quicker stops. More precise stops. All of the answers above are correct. What can friction brakes be used for? Brake a motor in both directions. Control machine tools. secure cranes. All of the answers above are correct. How do fall-safe friction brakes normally react in case of a power failure? The brake is applied only for a limited time. The power failure does not affect the brake state. The brake is automatically disengaged. The brake is applied automatically. What is the effect of jogging on power contacts? It has no particular effect. It improves their conductivity. It reduces their life expectancy. It increases their life expectancy.

Answers

Friction brakes are commonly used on electrical motors because they can hold a motor position, allow for quicker and more precise stops. Thus, all of the answers are correct. Friction brakes can be used to brake a motor in both directions, control machine tools, and secure cranes. All of the given options are correct.

Fall-safe friction brakes are designed to automatically engage in case of a power failure, ensuring that the equipment or machinery they are attached to stays in place and does not move or spin. Thus, it is of great importance to electrical motors.

Jogging, or rapidly starting and stopping a motor, can reduce the life expectancy of power contacts due to the increased wear and tear on the contacts. Therefore, jogging should be avoided unless it is necessary for the specific application.

To learn more about friction brakes, visit: https://brainly.com/question/22876618

#SPJ11

An OP AMP has a Gain Bandwidth product of 1 MHz and feedback is adjusted so the gain is 1000. This amplifier would have a relatively flat response over a range of frequencies from: A. DC to 1 KHz B. DC to 10 KHZ C. DC to 100 KHz D. DC to 1 MHz

Answers

The amplifier would have a relatively flat response over a range of frequencies from DC to 1 kHz. The correct answer is A. DC to 1 kHz.


To solve this, we can use the Gain Bandwidth product (GBW) formula.


Gain Bandwidth product (GBW) formula:
GBW = Gain x Bandwidth

Given that the Gain Bandwidth product is 1 MHz and the gain is 1000.

We can solve the bandwidth:

1 MHz = 1000 x Bandwidth

Bandwidth = 1 MHz / 1000 = 1 kHz

Therefore, this amplifier would have a relatively flat response over a range of frequencies from DC to 1 kHz.

Learn more about amplifier: https://brainly.com/question/28111650

#SPJ11

if the hbt has the same emitter doping and the same common-emitter current gainpoas the bjt, what is the lowerbound of the base doping of the hbt

Answers

If the hbt has the same emitter doping and the same common-emitter current gainpoas the bjt, to determine the lower bound of the base doping of an HBT (heterojunction bipolar transistor) when it has the same emitter doping and the same common-emitter current gain as a BJT (bipolar junction transistor), follow these steps:

1. Note that both HBT and BJT have three regions: emitter, base, and collector.
2. Understand that "doping" refers to adding impurities to the semiconductor material to increase its conductivity.
3. The common-emitter current gain (β) is defined as the ratio of the collector current to the base current in the common-emitter configuration.
4. For an HBT to have the same emitter doping and common-emitter current gain as a BJT, the base doping must be carefully controlled.
5. The lower bound of the base doping of the HBT must be such that it maintains the desired common-emitter current gain and does not significantly affect the transistor's performance.

To find the exact value of the lower bound of the base doping for the HBT, more information about the specific materials and characteristics of both the HBT and BJT would be needed. However, it's essential to ensure that the base doping is within a suitable range to achieve the same emitter doping and common-emitter current gain as the BJT.

Learn more about doping:

https://brainly.com/question/16629835

#SPJ11

select the output generated by the following code: new_list = [10, 10, 20, 20, 30, 40] for i in range(3): print(new_list[i]) new_value = new_list.pop(0)
a.10
20
30
b.20
40
60
c.10
30
50
d.0
1
2

Answers

The output generated by the given code is: a. 10 20 30

How to check for the output generated by the code?

The code initializes a list called new_list with six elements: [10, 10, 20, 20, 30, 40]. Then, it uses a for loop to iterate over the first three elements in the list, printing each element one by one.

The for loop iterates three times, as specified by range(3). In each iteration, the value of i increases from 0 to 2. Inside the loop, the print() function is used to print the element at the index i of new_list.

Here's the output of each iteration:

When i = 0, the first element of new_list (10) is printed.

When i = 1, the second element of new_list (10) is printed.

When i = 2, the third element of new_list (20) is printed.

Finally, the pop() function is used to remove and return the first element (at index 0) of new_list. The value is assigned to the variable new_value, which is not used in the code afterward.

The final output generated of new_list after using pop() is: [10, 20, 20, 30, 40].

Find more exercises on output generated by code;

https://brainly.com/question/20041115

#SPJ1

Look at the following statement. bookList[2].publisher[3] = 't'; This statement___. A) is illegal in C++ B) will change the publisher's name of the second book in bookList to ' t' C) will store the character 't' in tho fourth element of the publisher member of booklist [2] D) will ultimately result in a runtime error E) None of these

Answers

The statement "bookList[2].publisher[3] = 't';" will store the character 't' in the fourth element of the publisher member of bookList[2]. This statement is not illegal in C++.

bookList is an array of books.bookList[2] refers to the third book in the array (remember that array indices in C++ start at 0).publisher is a member variable of the book class that represents the name of the publisher.bookList[2].publisher[3] refers to the fourth character in the publisher name of the third book in the array (again, indices start at 0).'t' is a character literal that represents the letter 't'.Therefore, the correct option is C) will store the character 't' in the fourth element of the publisher member of bookList[2]. This statement will not result in a runtime error as long as bookList[2] exists and has a publisher name with at least four characters.

To learn more about C++ click the link below:

brainly.com/question/30905580

#SPJ11

show that (n 1)5 is o(n5).

Answers

We can choose a constant factor C = 1 to satisfy the inequality for all sufficiently large n. Therefore, we have shown that (n-1)⁵ is O(n⁵).

To show that (n 1)5 is o(n5), we need to prove that the limit of (n 1)5 / n5 as n approaches infinity is equal to 0.

To do this, we can use the limit definition of big O notation:

(f(n) is o(g(n)) if and only if lim (n → ∞) f(n) / g(n) = 0)

So,

lim (n → ∞) (n 1)5 / n5

= lim (n → ∞) [(n/n) - (1/n)]5

= lim (n → ∞) [1 - (1/n)]5

= 1

Since the limit is equal to 1, we can conclude that (n 1)5 is not o(n5).
To show that (n-1)⁵ is O(n⁵), we need to demonstrate that there exists a constant factor C such that (n-1)⁵ ≤ Cn⁵ for sufficiently large n.

Let's expand the term (n-1)⁵:
(n-1)⁵ = n⁵ - 5n⁴ + 10n³ - 10n² + 5n - 1

Now, divide both sides of the inequality by n⁵:
(n-1)⁵/n⁵ ≤ C
=> 1 - 5/n + 10/n² - 10/n³ + 5/n⁴ - 1/n⁵ ≤ C

As n approaches infinity, the terms 5/n, 10/n², 10/n³, 5/n⁴, and 1/n⁵ will all approach 0. Thus, the inequality becomes:
1 ≤ C

We can choose a constant factor C = 1 to satisfy the inequality for all sufficiently large n. Therefore, we have shown that (n-1)⁵ is O(n⁵).

Learn more about constant factor here:-

https://brainly.com/question/533409

#SPJ11

Determine the Additive drag for an inlet having an area of A1 of 5.0 m2 and a Mach no M1 of 0.7 while flying Mach no is 0.3 at an altitude of 1km where static pressure p =8.98x104N/m2 and static temperature is T=281.65K.

Answers

To determine the Additive drag for the given conditions, we need to use the equation for total pressure ratio across an inlet:

(Pt2 / Pt1) = [1 + 0.2 * (M1^2)]^3.5 / [1 + 0.2 * (M2^2)]^3.5

where,
Pt1 = Total pressure at the inlet
Pt2 = Total pressure at the exit
M1 = Mach no at the inlet
M2 = Mach no at the exit

First, let's calculate the total pressure at the inlet using the static pressure and temperature:

Pt1 = p * [1 + 0.2 * (M1^2)]^(7/2) / (1.4 * 287 * T)
   = 8.98 x 10^4 * [1 + 0.2 * (0.7^2)]^(7/2) / (1.4 * 287 * 281.65)
   = 1476.37 N/m2

Next, we can use the given Mach no and area to calculate the mass flow rate:

mdot = A1 * p * M1 / (sqrt(1.4 * R * T1))

where,
R = Gas constant = 287 J/kg K

mdot = 5.0 * 8.98 x 10^4 * 0.7 / (sqrt(1.4 * 287 * 281.65))
    = 35.71 kg/s

Now, we can use the mass flow rate and total pressure ratio equation to calculate the total pressure at the exit:

Pt2 / Pt1 = 1 - Additive drag
Additive drag = 1 - Pt2 / Pt1

(0.3 / 0.7)^2 = [1 + 0.2 * (0.7^2)]^3.5 / [1 + 0.2 * (M2^2)]^3.5

M2 = 0.178

Pt2 / Pt1 = [1 + 0.2 * (0.7^2)]^3.5 / [1 + 0.2 * (0.178^2)]^3.5
         = 1.2467

Additive drag = 1 - 1.2467
             = -0.2467

The additive drag is negative, which means that the inlet is producing more pressure at the exit than at the inlet.

To know more about additive drag

https://brainly.com/question/15187875?

#SPJ11

Other Questions
Why is it important to spread the bacteria over as much of the surface as possible when inoculating your plate for the disk diffusion test? How would this impact your results? Define a relation P on Z as follows: For all m, n Z,m P n m and n have a common prime factor.a. Is 15 P 25?b. 22 P 27?c. Is 0 P 5?d. Is 8 P 8? In which of these substances are the atoms held together by metallic bonding?A.CrB.SiC.S8D.CO2E.Br2 draw the major organic product of the claisen condensation of ethyl 3,3-dimethylbutanoate in the presence of sodium ethoxide. This is in C#:Using the output file generated from your program in Exercise 3A, write the program FindPatientRecords that prompts the user for an ID number, reads records from Patients.txt, and displays data for the specified record. If the record does not exist, display the following error message:No records found for p#An example of the program is shown below:Enter patient ID number to find >> p1ID Number Name Balancep1 Patient1 $20 While the average compensation at eGS is close to $ 99,000 nearly $22,000 of that consists of benefit costs T or F Write the following queries in "Relational Algebra" (No SQL, No Calculus): a) List all suppliers (ID and name) who supply item "Bolt". b) List all items (ID and name) supplied by both S2 and S4. c) For each supplier, list its ID, name, and the total quantity supplied by the supplier. A Model Speech of Self-IntroductionApply what youve learned in this chapter by analyzing the following case study, using the accompanying questions as a guide.Hi. My name is Adam Currier, and Im going to be introducing myself to you today. When I was first told that I had to introduce myself using a collage, I was afraid because I think college, and I immediately think art, which is a subject that I have never been any good at.So I was stuck on what I wanted to do for my college to introduce myself. So when Im stuck and when I need any kind of inspiration, I usually turn to my wall. And thats where I wentI turned to my wall. And when I look at my bedroom wall, I see quotes like "Be mindful of yourself and the world around you" and "Time is not a thing you have lost; it is not a thing you ever had." And I wondered why I had some of those quotes on my wall and other quotes like "Were not here to find a way to heaven. The way is heaven." And I started thinking about why I had these themes on my wall. And I realized that it was because of two major events that have happened in my life.The first one was the theme that really got me thinking about pursuing the goals I wanted to pursue, even when other people told me that it wasnt possible. And that was my sophomore year of high school. I had decided that I wanted to take eight classes instead of the normal six. So instead of being at school from 8 a.m. to 3 p.m., Id be there from 7 in the morning to 7 at night.And the minute people heard that I was going to do this, everyone said it couldnt be done. My mom, my dad, the people who have been most supportive of me in my life, told me that I couldnt do it. And that I would wreck my grade point average, and I would end up not being able to get into a college that I wanted to go to. My friends, who have also supported me right by my parents, told me that I couldnt do it.And I did it anyway. And I made it through without wrecking my GPA. I finished up with As and Bs just like I had all the years that Id been in school. Realizing that even when no one was supporting me, I set my mind to a goal and achieved that goal; I realize that its important to never let people tell you what you are capable of. If someone says you cant do that and its something you really want to do, do it anyways.The second theme on my wall was to enjoy every minute of life. And I was thinking about the main thing that made me think about that, and I realized that it was my grandfather. Every year since I ever remember, weve gone back to Iowa and spent a week of that summer just being with my dads parents, my grandparents. And each year as I grew, I grew closer and closer to my grandfather. And it got to the point where I no longer just knew him as a relative, but I knew him as a human being.Sitting outside on his porch one day, right before he died, he told me about his life and we were talking about what he had donebeing in World War II, being a dentist, being a community leaderall the things that he had ever achieved in his life, and it all sounded so perfect. I said, "Grandfather, what do you regret most in your life?" And he said, "Adam, I regret not seeing more sunsets." A couple months later he passed on, and I realized that I didnt enjoy every single minute with him as much as I could have and I didnt have the time with him that I thought that Id have.So I look at my wall now and I see the quotes on it and I see the stories on it and the pictures on it, and I realize that everyone Ive ever come into contact with, everyone Ive ever met, everything Ive ever done has all contributed to shaping the person I am, and my wall reflects the person that I am. So if I can pass on anything to you, I would hope that it would be to enjoy every minute of your life, and in that enjoyment never let people tell you what is possible because only you know your potential. Thank you.Questions:1. In his short speech, does Adam convey who he is?2. Based on Adam's speech, what characteristics do you think describe him?3. Does the closing of the speech reflect back to the opening? a construct of the social cognitive theory is reciprocal determinism. this includes the interactions and influence between all of the following factors, except: suggest three typical business situations where referential integrity avoids data problems identify the open intervals on which the function is increasing or decreasing. (enter your answers using interval notation.) y = x 100 x2 if the sum of concurrent forces is zero, the sum of moments of these forces is also zero.(T/F) Find f. (Use C for the constant of the first antiderivative and D for the constant of the second antiderivative.) f''(x) = 24x3 15x2 + 8x It has been said that quality management is really a "people" system, more than a technical system. If this is true...what conditions must first be in place for a firm to be successful with quality management? The Florida Deaf Art Show helps to bridge the divide between EARth and EYEth byA) allowing the Deaf community a rare glimpse into hearing cultureB) giving hearing patrons a rare glimpse into Deaf cultureC) providing a unique and private event for Deaf patronsD) teaching hearing individuals American Sign Language Which factor contributes most to the strength of an encryption system?a. The number of private keys used by the systemb. The length of the encryption key usedc. How many people have access to your public keyd. The secrecy of the encryption algorithm used a compound called vinyl chloride has a composition of 38.43% carbon, 4.838% hydrogen, and 56.72% chlorine. when vinyl chloride is polymerized (many single units linked together to form a long chain) under certain conditions, a white solid called polyvinyl chloride is formed with molecular mass of 23875. what is the molecular formula of polyvinyl chloride ? johnson incorporated just registered and issued its bonds, which will be sold in the bond market for the first time. johnson incorporateds bonds would be referred to as the waiting times between a subway departure schedule and the arrival of a passenger are uniformly distributed between 0 and 5 minutes. find the probability that a randomly selected passenger has a waiting time less than 2.75 minutes. The position of a particle moving along a coordinate plane is s = StartRoot 1 + 5 t EndRoot, with s in meters and t in seconds. What is the particles velocity when t = 3 sec?a. 1/8 m/sb. 2 m/sc. 5/8 m/sd. 4 m/s