TransWikia.com

Recent Questions (Page 14)

Let's help others by answering their questions!

Why are simple models of coupled pendulums incapable of describing irreversible energy dissipation?

Consider two pendulums $A$ and $B$ coupled by a spring and also regard $A+B$ to be a completely isolated system. Let us start the system in an...

1

Physics Asked on 2 years ago

Why Doesn't Thermal Radiation Render Thermionic Conversion Unable To Approach Carnot Efficiency?

Thermionic Conversion follows the classic Richardson-Dushmann Equation for thermionic current as a function of temperature squared: $$J_{RD} = A_0 T^2 expleft(-frac{phi}{k_B T}right)$$where$J_{RD}$ is the...

1

Physics Asked on 2 years ago

What is the power while accelerating a bicycle?

With respect to this question, the power on a accelerated body, that moves in the same direction of the acceleration, can be calculated by $W = Fv$, where...

5

Physics Asked on 2 years ago

Rotational motion and angular velocity

Why does $N=0$ when w=w critical? What does "Mass m falls away from the drum if N ≤ 0, when ω ≤ ωcritical" mean?I don't understand the...

2

Physics Asked on 2 years ago

Why does the piano sound of my keyboard sound so "odd" through my audio interface?

I use a Yamaha psr-s670 and a focusrite 2i2 interface for production. When I choose a sound like Strings or Sax, the audio sounds clean and rich in the DAW,...

0

Sound Design Asked by Moises Sagols on 2 years ago

Is it less secure to force periodic user logouts vs keep them logged in?

I've been unable to find any research or information on this. Google periodically signs me out and forces me to sign back in. I have multiple devices and multiple...

2

Information Security Asked on 2 years ago

What usually happens to the symmetric (session) key after decrypting an email? Can the key be recovered if changing private keys?

I've been preparing for a CISSP exam and was reading about applied cryptography in regard to email. It's my understanding that the popular schemes (PGP,S/Mime) use a combination of asymmetric...

1

Information Security Asked by jaybeatle on 2 years ago

Automatically purging binary logs

I'm currently trying to create an scheduled event on MySQL to purge binary logs every week. The create event statement is as follows:CREATE EVENT purgebinlogsON SCHEDULE EVERY 1 WEEKSTARTS...

6

Database Administrators Asked by kriegu on 2 years ago

What is the difference between sys.dm_hadr_ tables and sys.availability_groups / sys.availability_replicas?

Browsing around some sys tables, I see: sys.dm_hadr_availability_replica_cluster_nodes.group_name = sys.availability_groups.name and sys.dm_hadr_availability_replica_cluster_nodes.replica_server_name = sys.availability_replicas.replica_server_name and sys.dm_hadr_availability_replica_cluster_nodes.node_name = sys.availability_replicas.replica_server_name and sys.dm_hadr_database_replica_states.group_id = sys.availability_groups.group_id Could someone please clarify for me whether the...

1

Database Administrators Asked on 2 years ago

MongoDB 4.2 using change streams with read concern majority disabled in a PSA deployment

I currently run a PSA (Primary, Secondary, Arbiter) deployment and thous only have two databearing nodes.In case of a databearing node going down, read concern majority prevented the change...

1

Database Administrators Asked by Franz Huebner on 2 years ago

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP