: Differentiate between serial and parallel data transfer withat least one example of each from computer sciencedomain.

Answers

Answer 1

Answer:

In serial communication transfers one bit of data at a time, while parallel communication transfers many bits of data at the same time. Serial communication transmits the data bits sequentially, while parallel communication transmits data bits simultaneously, allowing greater amounts of data to be transferred.

-Serial communication is the one used to communicate the Arduino with the Computer through the USB cable.

-An example of a parallel port is the printer port. The Parallel Port was only created and used in the printers interface and the computers.

Explanation:

In serial communication, each bit is sent by its own clock flank where conditions are defined after each byte, if it is synchronous or asynchronous. In parallel communication there is only one single clock flank where the information is sent where it is an advantage to use it where there are several input or output data.

I hope it's help you.


Related Questions

What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technologies you would use

Answers

Answer Explanation

There are many things to improve the security of business with the help of internet

the pillars of business depends upon the information and internet provide security to these information.the computer or laptop which is used for business purpose are secure by internetwe use hardware and software firewalls to protect the PC or laptop. we use antivirus to protect the systemfor runing the computer we uses software firewallsfor protection purpose we use hardware firewalls

. What is the final value of “y” after this for loop is finished? for (y = 3; y<=14; y+=5)

Answers

Answer:

18

Explanation:

In First iteration y  = 3 and condition is y<=14 i.e. 3<=14 means true and continue the loop and increment the value of y by 5, means y will become 8

In Second iteration y  = 8 and condition is y<=14 i.e. 8<=14 means true and continue the loop and increment the value of y by 5, means y will become 13

In Third iteration y  = 13 and condition is y<=14 i.e. 13<=14 means true and continue the loop and increment the value of y by 5, means y will become 18

In Fourth iteration y  = 18 and condition is y<=14 i.e. 18<=14 means false and exit from the loop

So the value of y will be 18 after the loop

int myArray-11,3,-8,30,-2,0,5,7,-100,44); Write a loop statement to display the positive numbers each on a separate line like this: 30

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

 int myArray[] = {-11,3,-8,30,-2,0,5,7,-100,44};

 int n = sizeof(myArray)/sizeof(myArray[0]);

 for(int i=0;i<n;i++){

     if(myArray[i]>=0){

         cout<<myArray[i]<<endl;

     }

 }

  return 0;

}

Explanation:

First include the library iostream in c++ programming for using the input/output function.

Then, create the main function and define the array with the elements which contain both positive element as well negative elements.

after, use the for loop for traversing the array and inside the loop take the conditional statement for check if element in the array is positive.. if it true then print the element on the screen with separate line.

You can use ____ arguments to initialize field values, but you can also use arguments for any other purpose.

a.
object

b.
constructor

c.
field

d.
data

Answers

B.constructor I think that’s the answer

Write a C++ program that takes as input a list ( an array) of n integrers and finds the number of negative inetgers inthe list (array ).
Side Note: The problem did not come out ofthis book but the information that I study is from this book. And Iam not getting how to write the program.

Answers

Answer:Following is the program for the count of negative integers in an array:-

#include <bits/stdc++.h>  

using namespace std;

int main()

{

   int n,count=0;//declaring 2 variables n and count and initializing count with 0..

   cout<<"Enter the size of the array"<<endl;

   cin>>n;//prompting the size of the array...

   int negative_nums[n];//array of integers of size n..

   cout<<"Enter the numbers"<<endl;

   for(int i=0;i<n;i++)

   cin>>negative_nums[i];//prompting elements of the array...

   for(int i=0;i<n;i++)//iterating over the array....

   {

       if(negative_nums[i]<0)// if integer in the array at ith position is negative...  

       count++;// increasing the count...

   }

   cout<<"The number of negative numbers are "<<count<<endl;//printing the count of negative integers...

   return 0;

}

Explanation:

1. In the program i have taken a count integer initializing it with 0

2. Iterating over the array.

3. If the element at ith position is less than zero then increasing the count by 1.

4.Printing the count of negative integers in the array.

In a doubly linked list, every nodecontains the address of the next node and the previousnode except for the ____ node.
a. middle

b. last

c. first

d. second to last

Answers

Answer:The answer is (c).first.

Explanation:

In doubly linked list each node possesses the address of next node(except last node) because there is no node present after the last node .

and the address of previous node(except first node) because there is no node present before the first node.

So the conclusion is that the first node does not contain the address of previous node and the last node does not contain the address of the next node.

Construct a SR latchfrom

1) two NAND gates.

2) two NOR gates

3)Also construct SR Latch with a control input.

Answers

Answer:

Refer to the images for different S-R Latches.

There are 3 images attached 1 having S-R latch with 2 NAND gates 2nd having S-R Latch with 2 NOR gates and last having S-R latch with control input.

Difference between NAND gated S-R latch and NOR gated S-R latch is the output is reversed.

In latch with control input the latch will only work when the control input or Enable signal in our image is HIGH or 1.

Just as you can block statements that depend on an if, you can also block statements that depend on a(n) ____.

a.
Boolean expression

b.
operator

c.
else

d.
constant

Answers

D. Constant is the answer I think
Final answer:

The statements that can be blocked in programming, similar to those depending on an if statement, depend on a(n) 'else'. An 'else' statement allows for the conditional execution of a block of code when the 'if' condition is not met.

Explanation:

Just as you can block statements that depend on an if statement, you can also block statements that depend on a(n) c. else. In programming, an else statement is used to execute a block of code when the condition in the if statement is not met. Both if and else statements are structured to handle Boolean expressions which evaluate to either true or false. These control flow statements form the building blocks of logical structures within code and enable conditional execution of code segments.

It's important to distinguish these structures from constants, operators, and statement constants. A constant holds a value that does not change throughout the execution of the program, whereas an operator is used to perform operations on variables and values. A statement constant, on the other hand, is a symbolic representation of a particular statement (or truth value) that remains unchanged within the logical framework of the discussion or argument. Using conditional statements like if-then-else allows programmers to control the flow of execution and make decisions within a program.

Which one is not among standard creation committee?

ITU-T
IEEE
Internet society and IETF
All of the given

Answers

Answer:

All of the given

Explanation:

ITU-T stands for International Telecommunication Union (Telecommunication). It generates standards for the telecommunication sector.IEEE stand for Institute of Electrical and Electronics Engineers. It generates global standards for a wide range of industries.Internet Society and IETF : IETF stands for Internet Engineering Task Force. Both the Internet Society and IETF are responsible for standards related to the internet.

Hence all the given options are examples  of standard creation committee.

Please answer the question about the economic idea of technology. Which of the statements is true of technology?
a.Technology refers to the processes a firm uses in production.
b.Technology refers most directly to the methods firm managers use to organize overseas operations.
c.Technology is the use of computers and software to create economic efficiency.
d.The economic definition of technology is unrelated to the management skills or training that firm employees may have.

Answers

Answer:

C - Technology is the use of computers and software to create economic efficiency

Explanation:

The economic idea of technology refers to everything that can assist in producing goods more efficiently (faster/cheaper/higher quality). Economists refer to technology as an innovative method of executing things, rather than referring to physical hardware.

Answer:

The Correct Answer is C

Explanation:

Technology, for statisticians, is anything that assists us manufacture things quicker, more reliable or more affordable. When you think of technology there's a great opportunity you think of material things like large devices or high-speed computers. But when statisticians debate about technology, they're imagining more broadly about distinct methods of making things.

Why do local variables lose their values between calls to the function in which they are

defined?

Answers

Answer:

Variables which are declared within a function are called Local variables.They are named local because they are used locally only means they cannot be used outside the function in which they are declared.These local variables exist in the memory till the function execution starts and are deleted when the execution of function ends.Hence they lose their value between calls to the function in which they are declared.

Final answer:

Local variables lose their values between function calls because they are scoped to the function block, meaning they are removed from memory after the function ends. They prevent naming conflicts and allow modular coding by shadowing any variables with the same name defined outside the function.

Explanation:

Local variables lose their values between calls to the function in which they are defined because they are scoped to the function block. This means that once a function call ends, the local variables that were defined within that function become inaccessible and are typically removed from memory, a process sometimes assisted by a garbage collector in certain programming languages.

Local variables are advantageous because they prevent naming conflicts and ensure that variables within a function do not affect variables with the same name outside the function, effectively shadowing them. This encapsulation allows for modular code, where functions can be understood and debugged in isolation without concerning other parts of the program.

In contrast to global variables, which persist throughout the runtime of the program, local variables defined within, for example, a block in C++ are known to be 'short-lived'. They encourage good programming practices by being limited to their respective scopes, thereby improving code clarity and potential memory efficiency.

What are the 3rdand 4th forms of normalization, explain with examples?

Answers

Answer:

Normalization is a technique in which database are designed and organizes tables in such manner that reduces dependency and redundancy of the data.  It can divide larger tables into the smaller tables and used them using different relationships.

3rd form of normalization is defined as, the table whose non primary key field are dependent on the primary key only and have no dependence any other non key primary field in the tables.

4th form of normalization is defined as, is used in database normalization where they are a non trivial multi value dependency other than candidate key. It builds on the first,second and third normal forms and the Boyce Codd Normal Form.

Guided transmission media employ an antenna for transmitting through air or vacuum.

a) True b) False

Answers

Answer: False

Explanation:

Unguided medium employs an antenna for transmitting through air or vacuum.

For guided mediums the transmission is in the form of twisted copper wires, shielded twisted copper wire and optical fibres. They henceforth do not depend upon antennas for transmission through air using antennas.

what are the differences between levels 1, 2 and 3 cache memoroes??

Answers

Answer: Level 1 cache memory-it is the memory which is built on the microprocessor itself

Level 2 cache memory- it is the memory which is found on the other chips usually

Level 3 cache memory-it is sort of a memory container/bank that is built in the CPU

Explanation:

Level 1 cache memory is the  primary cache memory which is fast and is usually stuck on the microprocessor chip.It has a small size .Level 2 cache memory is fast secondary cache memory  which is usually on the different chip and is larger in size compared to L1 cache memory.L 3 cache memory is the cache memory is present for the supporting the L1 and L2 cache memory and to make their processing better and is present in the CPU usually.

What effect does the clock rate of a computer have on the execution speed of an instruction?

Answers

Answer:

Clock rate also known as clock speed is the rate at which microprocessor executes instructions.That means clock rate is directly proportional to the execution speed of an instruction.Microprocessor is the core of a computer a system it contains all the functions of a central processing unit.So if the clock rate is more  execution speed of an instruction is more if clock rate is less execution speed of an instruction is less.

Distinguish the critical factors that affect the network performance in wireless Mesh Network?

Answers

Answer:

Physical Object and Radio Frequency Interference

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are two main factors that affect a networks performance when talking about Wireless Mesh Network. The two factors are Physical Object and Radio Frequency Interference.

Physical Objects can cause interference in mesh networks. Common Objects such as trees and houses are common causes of interference on wireless mesh networks. The best connection is gained with a clear sight from one node to another. Specific objects such as aluminum made objects can cause complete signal severance.

Radio Frequency Interference is the second main factor when dealing with mesh networks. If there are many signals on the same frequency, Information or packets can get lost in the process causing really bad connection.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

How many times will the following loop repeat?

i = 2; while i <= 16; i = i+2; end

A. 0 times

B. 2 times

C. 8 times

D. 16 times

Answers

Answer:

8 times

Explanation:

The while is execute again and again until the condition is TRUE.

In the question:

the value of i=2, when program enter the loop it check the condition when

2 <= 16, condition TRUE. it update the value i = 4.

Again the loop check condition, 4 <= 16, condition TRUE, i become 6 and so on...

4,6,8,10,12,14,16

when i = 16 loop condition is also TRUE. 16 <= 16. So, it again run the loop and i become 18.

then, the loop condition false and it exit the loop.

so, i run until 18

4,6,8,10,12,14,16,18

Therefore, the answer is 8 times.  

. How is using 0 / 1 or true / false in specifying digital an abstraction?

Answers

Answer:

Digital electronics involves 2 states which are abstracted as 0/1 or true/false.

Explanation:

Digital electronics involves 2 states. For TTL logic this corresponds to 0 Volt (0) or 5 Volt (1). Analyzing further, a  digital waveform has a square shape  (not necessarily a perfect square) with 2 levels denoting the two states, namely, true(1) or false(0). So a 0 or 1 is not actually absolute but 0 corresponds to voltage level below a threshold voltage whereas 1 corresponds to voltage level above a threshold voltage.

whic flag has a special role in debuging
a. sign flag, b.interrupt flag, c. trap flag, d.direction flag

Answers

Answer: Interrupt flag

Explanation: In computer field , debugging field is referred as the process of finding the fault,error or bug and removing it from the software and hardware system. This process this carried out because this helps in avoiding the unexpected crash of the system due to the errors.

Flags are necessary for knowing about the source where the interrupt arises from and removing it, so interrupt flag is used for debugging .

Answer: Interrupt flag

Explanation: In computer field , debugging field is referred as the process of finding the fault,error or bug and removing it from the software and hardware system. This process this carried out because this helps in avoiding the unexpected crash of the system due to the errors.

Flags are necessary for knowing about the source where the interrupt arises from and removing it, so interrupt flag is used for debugging .

Given an integer K, find the KthFibonacci number using recursion.

Write a function that accepts an integer K. The function should return Kth Fibonacci number using recursion.

Input:

10

where:

First line represents a value of K
Output:
55

Answers

C program that find Fibonacci number using recursion

#include<stdio.h>

int fib(int k)  /*Function that returns Fibonacci number using recursion*/

{  

  if (k <= 1)  

     return k;  

  return fib(k-1) + fib(k-2); //Recursive loop

}  

  int main ()  //driver function

{  

 int k;

 printf("Enter the Number for which we requires Fibonacci number-\n"); /*Taking input as k integer for finding its Fibonacci number*/

 scanf("%d",&k);

 printf("%d", fib(k));  //Calling function fib

  return 0;  

}

Output

Enter the Number for which we requires Fibonacci number  -10

55

Function that returns Fibonacci number using recursion

int fib(int k)  

{  

  if (k <= 1)  

     return k;  //returning Fibonacci Number

  return fib(k-1) + fib(k-2);

}  

Here fib is the function of return type integer which accept a parameter k of integer type. In this function we are returning Fibonacci number.

Applications are programs that interact directly with the database.

Answers

Answer:

"Applications are programs that interact directly with the database" - This is False

Explanation:

An Application is a program or software which receives user and/or other application inputs in order to perform one or various tasks, activities or functions. Applications can have one or many programs within it running different tasks some of which can interact directly with a database but the Application itself does not.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Which type of page of replacement algorithm is Windows XP and Unix are using?

Answers

Answer:

Windows XP uses the Local Page Replacement algorithm. It is a type of FIFO. In this, Pages are taken from processes using more than their minimum working set and Processes initialize with a default of 50 pages. XP monitors page fault rate and adjusts working set size accordingly.

UNIX uses the Global replacement Algorithm through Modified second-chance clock algorithm.  Here Pages are aged with each second and Pages that are not used for a long time will eventually have a value of zero.

#A year is considered a leap year if it abides by the #following rules: # # - Every 4th year IS a leap year, EXCEPT... # - Every 100th year is NOT a leap year, EXCEPT... # - Every 400th year IS a leap year. # #This starts at year 0. For example: # # - 1993 is not a leap year because it is not a multiple of 4. # - 1996 is a leap year because it is a multiple of 4. # - 1900 is not a leap year because it is a multiple of 100, # even though it is a multiple of 4. # - 2000 is a leap year because it is a multiple of 400, # even though it is a multiple of 100. # #Write a function called is_leap_year. is_leap_year should #take one parameter: year, an integer. It should return the #boolean True if that year is a leap year, the boolean False #if it is not. #Write your function here!

Answers

Answer:

To check if the year comes under each 100th year, lets check if the remainder when dividing with 100 is 0 or not.

Similarly check for 400th year and multiple 0f 4. The following C program describes the function.

#include<stdio.h>

#include<stdbool.h>

bool is_leap_year(int year);

void main()

{

int y;

bool b;

 

printf("Enter the year in yyyy format: e.g. 1999 \n");

scanf("%d", &y);     // taking the input year in yyyy format.

 

b= is_leap_year(y);  //calling the function and returning the output to b

if(b==true)

{

 printf("Thae given year is a leap year \n");

}

else

{

 printf("The given year is not a leap year \n");

}

}

bool is_leap_year(int year)

{

if(year%100==0)   //every 100th year

{

 if(year%400==0)   //every 400th year

 {

  return true;

 }

 else

 {

  return false;

 }

}

if(year%4==0)  //is a multiple of 4

{

 return true;

}

else

{

 return false;

}

}

Explanation:

Output is given as image

COMPARE AND DIFFERENTIATE THE SERVER AND WORKSTATION BBRIEFLY?

Answers

Answer: Servers perform actions and replies back to clients when connected in the form of the back end of application being used.

Workstations on the other hand are systems where high performance work is performed for getting a high quality of output.

Explanation:

Examples of servers are the application servers or web server. Examples of workstations include graphics editing and audio editing workstations. If we compare in term so reliability i.e there response to failures or the frequencies of failures, it is found that workstations are more reliable in comparison to servers.

Internet marketing typically is one-way and impersonal ( true or false)

Answers

Answer:

Internet marketing typically is one-way and impersonal- False.

The following statement is false.

Given memory partitions of 100K, 600K, 400K, 500K, and 300K (inorder), how would each of the First-fit, Best-fit, and Worst-fitalgorithms place processes of 117K, 412K, 325K, and 510K (inorder)?

Answers

Answer:

First-fit, Best-fit, and Worst-fit these are the techniques for the memory allocation of process in the memory locations.

First -fit: Allocating the first memory location to the process which is just smaller than or equal.

Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.  

Worst-fit: Allocating the largest memory location in the storage to the processes.

These are the memory locations-100 k,600 k,400 k,500 k,300 k                    and size of processes-117 k,412 k,325 k and 510 k

For the first-fit,

We allocate 117 k to the 600 k memory location

Then, we allocate 412 k to the 500 k because others don't have the size.

Then,we allocate 325 k to the 400 k.

510 k will stop,as no memory locations can execute.

For the Best-fit,

We allocate 117 k to the 300 memory location

Then,we allocate 412 k to the 500 k.

Then,we allocate 325 k to the  400 k not 600 k according to best-fit.

Then we allocate 510 k to the 600 k.

For the worst fit,

We allocate 117 k to the 600 k memory location according to the worst-fit algorithm.

Then,we allocate 412 k to the 500 k.

Then,we allocate 325 k to the 400 k

We can' allocate 510 k in any memory location.

Explanation of First-fit, Best-fit, and Worst-fit algorithms in memory management.

In **First-fit** algorithm, the system allocates the first available partition that is big enough for the process. For the given partitions and processes, the 117K process would be placed in the 400K partition, the 412K process in the 600K partition, the 325K process in the 400K partition, and the 510K process in the 600K partition.

**Best-fit** algorithm assigns the smallest partition that is big enough for the process. The 117K process would go into the 400K partition, the 412K process in the 500K partition, the 325K process in the 400K partition, and the 510K process in the 600K partition.

**Worst-fit** algorithm allocates the largest available partition that can accommodate the process. In this scenario, the 117K process would be placed in the 600K partition, the 412K process in the 600K partition, the 325K process in the 400K partition, and the 510K process in the 600K partition.

Thetremendous diversity of the source systems is the primary reasonfor their complexity. Do you agree

Answers

Answer:

Yes, i agree with the given statement that the tremendous diversity of the source system is the primary reason for their complexity as, when we storing the large amount of the data and the data warehousing are based on the solution to implemented to the data are get transformed for matched the desired queries. There is also the duplicate entry elimination which increased the complexity of the data.

To create a window, which of thefollowing classes has to be extended?ContainerJFrameJButtonJTextField

Answers

Answer:

J frame class has to be extended for the creation of a window

Explanation:

J frame needs to be extended to create a window, this is because this class in windows has a title, support buttons components, a border or we can say it has decorations for windows.  

The rest of the classes like J button and J text fields lie within the J frame and the Container class is a super class and provides only outlines to J Frame class.

What is the output of the C++ codeabove?

a.

0 1 2 3 4

c.

0 5 10 15 20

b.

0 5 10 15

d.

5 10 15 20

int list [5] = {0, 5, 10, 15, 20};
int j;
for (j = 0; j < 5; j++)
cout << list [j] << " ";
cout << endl;

Answers

Answer:

c

Explanation:

xxhdudhshshsudjdjd

Regarding enumerations, the ____ method returns an array of the enumerated constants.

a.
values

b.
valueOf

c.
toArray

d.
ordinal

Answers

Answer:

a. values

Explanation:

The values() method returns an array of all values of an enumeration. This method is defined automatically by the java compiler for the enum data type.

For example:

enum Traffic_Signal {RED,YELLOW,GREEN};

for(Traffic_Signal t : Traffic_Signal.values()){

   System.out.println(t);

}

This code segment will print out all the valid values in the Traffic_Signal enumeration.

Other Questions
20 POINTS! WILL GIVE BRAINLIEST!Bryce had a $25 gift card to use on songs and games at an online media store. Songs cost $2 each and games cost $5 each. Bryce spent all the money on the gift card to download 8 items. Solve the system to determine how many games he purchased. Let s represent the number of songs and g represent the number of games.s + g = 82s + 5g = 25Bryce purchased _____ games. How much of a 10% cream must be mixed with a 0.5% cream to prepare 4 oz. of a 3.75% cream? A. 23 g B. 41.1 g C. 17.5 g D. 60 g VI.20.0?o and Juliet.What causes the servant to ask for Romeo's help?I read?The servant needs directions.The servant cannot see.The servant needs to praybok: but, 1The servant cannot read.geing to go.] One-way tabulations serve several purposes in the research process. They can: a) Profile sample respondents b) Distinguish between heavy and light users c) Establish the percentage of respondents that respond differently to different situations d) Calculate summary statistics e) All of the above (Will get brainliest) Simplify the expression: left square bracket left parenthesis 18 6 right parenthesis 3 plus 1 right square bracket 7 A.43 B.259 C.7 D.336 )What is proceduralabstraction, and why is it important inComputer Science What beliefs in relation to reason gave rise to the Enlightenment? Which description from the list below accurately describes the relationship between What is the difference of the two polynomials (9x^2+8x)-(2x^2+3x) A 0.18-kg ball on a stick is whirled on a vertical circle at a constant speed. When the ball is at the three oclock position, the stick's tension is 19 N. Find the tension in the stick when the ball is (a) at the twelve oclock and (b) at the six oclock positions. You're moving into a new apartment and trying to fit your large chair through the doorway. Your friend, who is helping you move, suggests rotating the chair a different way and seeing if it fits. However, you remember that the last time you moved the chair, it must first be reclined in order to fit through the doorway. Which choice below correctly identifies the learning strategies that you each are using in this example? A. Your friend is demonstrating insight, and you're demonstrating imprinting. B. Your friend is demonstrating trial-and-error, and you're demonstrating imprinting. C. Your friend is demonstrating trial-and-error, and you're demonstrating insight. D. Your friend is demonstrating insight, and you're demonstrating trial-and-error The reading speed of second grade students in a large city is approximately normal, with a mean of 9090 words per minute (wpm) and a standard deviation of 10 wpm. Complete parts (a) through (f). (a) What is the probability a randomly selected student in the city will read more than 9494 words per minute? The probability is nothing. What was the role of the provincial congress Why was korea divided at the 38th parallel Reference variables allow arguments to be passed by ____________. A couple, Jack and Jill, are both deaf, and each has one parent who also is deaf. Jack and Jill have 8 children: 6 boys and 2 girls, 4 of whom (1daughter and 3 sons) are also deaf?1. identify the specific pattern of inheritance (if any) indicated for this family2. indicate what criteria the pedigree presents that support the correct pattern of inheritance for this health problem? Under what circumstances did the United States emerge as a world power, and how did the nation respond to this new role? SHORT ANSWER The main function of the _________________ is activating the body in times of emergency, for example, by increasing the heart rate, dilating the pupils of the eyes, or inhibiting digestion. Ryan has deposited $100 into a retirement account at the end of every month for 50 years. The interest rate on the account is 1.5% compounded monthly. a) How much is in the account after 45 years? b) How much inte rest was earned over the 45 years? A solid 0.75 in diameter steel shaft transmits 7 hp at 3,200 rpm. Determine the maximum shear stress magnitude produced in the shaft. Hint: Use P=T and convert hp to ft-lbf/s. Find by using Tc/J. Recall max shear stress will be on the outer most surface.