1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
5

Water circulates throughout a house in a hot water heating system. If the water is pumped at a speed of 0.50m/s through a 4.0-cm

diameter pipe in the basement under a pressure of 3.03x10^5 Pa, what will be the velocity and pressure in a 2.6-cm diameter pipe on the second floor 5.0m above?
Engineering
1 answer:
igor_vitrenko [27]3 years ago
7 0

Answer:

velocity and pressure in a 2.6-cm:

P2 = 2.53x10^5Pa, v2 = 1.18m/s

Explanation:

Pressure = P, Velocity = v, Height = h, Diameter = d, Radius= r, Area = A

Area = πr^2

From the question:

v1 = 0.5m/s

d1 = 4cm = 0.04m

r1 = d1/2 = 0.04/2 = 0.02m

Since water was pumped from basement, h1 = 0m

P1 = 3.03x10^5 Pa

A1 = π×0.02×0.02

A1 = 0.0004πm^2

v2 = unknown

d2 = 2.6cm = 0.026m

r2 = d2/2 = 0.026/2 = 0.013m

h2 = 5m

P2 = unknown

A2 = π×0.013×0.013

A2 = 0.000169πm^2

Using continuity equation:

A1v1 = A2v2

0.0004π * 0.5 = 0.000169π * v2

v2 = (0.0004π * 0.5)/(0.000169π)

v2 = 1.18m/s

Applying a Bernoulli principle

P + 1/2*density*v^2 + density*g*h =C

C = constant

P1 + 1/2*density*v1^2 + density*g*h1

= P2 + 1/2*density*v2^2 + density*g*h2

Let g = 9.81m/s

density of water = 1000kg/m^3

(P1-P2) = 1/2* density(v2^2 - v1^2) +(density*g*h2) - (density*g*h1)

(P1-P2) = 1/2* density(v2^2 - v1^2) +

density* g(h2-h1)

(3.03x10^5 - P2)= 1/2*1000 (1.18^2-0.5^2) + 1000(9.81(5-0))

(3.03x10^5 - P2) = 500(1.3924-0.25) + 49050

3.03x10^5 - P2 = 571.2 + 49050

3.03x10^5 - P2 = 49621.2

3.03x10^5 - 49621.2 = P2

P2 = 253378.8

P2 = 2.53x10^5Pa

P2 = 2.53x10^5Pa, v2 = 1.18m/s

You might be interested in
What is a type of technology that can be attached to a tag and used to identify postal packages ​
nydimaria [60]
Here’s the answer
Ur welcome

5 0
3 years ago
First drilled to a depth of 1 47/64 how much deeper must it be drilled to reach the depth indicated?
lara [203]

Answer:

  1 13/64

Explanation:

The depth of the hole is the height of the block less the remaining material below the hole:

  depth = 1 3/8 +1 15/16 - 3/8 = (1 3/8 -3/8) +1 15/16 = 2 15/16

We want to find the difference between this depth and the depth of the hole already drilled:

  2 15/16 -1 47/64 = 2 60/64 -1 47/64

  = (2 -1) +(60 -47)/64 = 1 13/64

The hole must be drilled 1 13/64 deeper to match the drawing.

7 0
2 years ago
What types of issues MAY occur to slow or prevent the best outcome?
german

Answer:

im sorry but i cant find any studies about this and im 3 days late

4 0
3 years ago
Why does the compression-refrigeration cycle have a high-pressure side and a low-pressure side?
Cloud [144]

Answer: D

Explanation:

8 0
3 years ago
You have just been hired as the Security Manager of a medium- sized Financial Services company employing 250 people in New Hamps
lakkis [162]

Answer:

Explanation:

Let us Begin with the first Policy;

Email Policy

  • Outline/Overview - At present, email is truly outstanding, simple, and well known correspondence medium which interfaces workers, clients, and different partners of the organization. Because of the improvement of the innovation, the aggressors are attempting to utilize email for doing assaults which are driving security dangers inside the organization. Henceforth, it is significant for all representatives to comprehend the best possible utilization of email.

  • Reason/Purpose - The motivation behind the email strategy is to affirm the correct utilization of email address of the organization by the representatives.

  • Scope - The arrangement is covering the utilization of any email which is sent from an organization email address. It additionally applies to all related representatives, clients, and different partners who are working in the interest of the organization.

  • Policy

  1. The email address of the organization ought to be utilized by workers just for business reason. Representatives are restricted to unlawfully utilize the organization email address.
  2. The utilization of the email office must be steady with other security approaches of the organization. It gives the guarantee of the moral conduct inside the organization.
  3. The "Information Protection Standards" must be utilized to make sure about the substance of the messages.
  4. The organization must need to hold just clear email and keep up a record which stores the substance of the necessary messages.
  5. The representatives ought to need to take care during opening any sort of dubious email which originates from unlawful location. They should need to answer to the security chief on the off chance that they got any sort of such email.
  6. It isn't permitted to advance email to any outsider utilizing the organization email address.
  7. The representatives are not permitted to utilize the organization email address for individual works and correspondence.

  • Policy Compliance - The security group of the organization will confirm the consistence of the approach utilizing suitable strategies, for example, stroll through, inward and outside reviews, business instrument reports, video checking, and input. The security group must need to educate and support any sort of special case to the arrangement ahead of time.

  • Related Standards, Policies, and Processes - Data assurance guidelines
  • Definitions and Terms - None

The Second Policy;

WIFI and Internet usage policy

  • Overview -  The expanding utilization of web associations is bringing different sorts of security dangers for the organization. It turns into a significant asset of assault. A WIFI and Internet utilization strategy will control the unlawful and dishonest use of web assets inside the organization.

  • Purpose - The motivation behind WIFI and Internet use strategy is to affirm the best possible utilization of WIFI and Internet by the representatives inside the organization.

  • Scope - The arrangement applies to each web client including full-time representatives, low maintenance workers, colleagues, and so on of the organization.

  • Policy

  1. Asset utilization – Employees will get consent and endorsement to get to WIFI and Internet if sensible business needs are found. As per the present place of employment obligations, the WIFI and Internet administrations will be conceded to the workers.
  2. Permitted utilization – WIFI and Internet use is conceded to representatives just for supporting the business capacities and finishing some other important works. All web clients must need to follow the business standard during the utilization of assets.
  3. Individual use – Employees can by and by utilize the WIFI and Internet assets by taking consent from the IT office. They should need to take care during individual use as the organization consistently screens their web use exercises.
  4. Denied utilization – The representatives are not permitted to abuse the accessible database of the organization or unlawful web surfing through organization web assets.

  • Policy Compliance - The security group of the organization will confirm the consistence of the arrangement utilizing proper techniques, for example, stroll through, interior and outer reviews, business apparatus reports, video checking, and input.

  • Related Standards, Policies, and Processes - The organization must need to utilize "Web utilization inclusion affirmation structure" for taking the affirmation from every representative in the wake of perusing the arrangement. The affirmation structure guarantees that each representative appropriately read the arrangement and get it.

Affirmation

I peruse and comprehend the approach. I am concurred with the arrangement.

Worker name and signature________________________

IT administrator name and signature_______________________

Date_____________________

  • . Definitions and Term - None
3 0
3 years ago
Other questions:
  • Consider a C.T. system in s-plane below. Draw DF1 (Direct Form 1) realization. (by hand) Perform system realization using MATLAB
    5·1 answer
  • ear shaft.3. Chapter 12 –Loading on Spur Gears: A 26-tooth pinion rotating at a uniform 1800 rpm meshes with a 55-tooth gear in
    6·1 answer
  • For a turning operation, you have selected a high-speed steel (HSS) tool and turning a hot rolled free machining steel. Your dep
    9·1 answer
  • A civil engineer is analyzing the compressive strength of concrete. The compressive strength is approximately normal distributed
    7·1 answer
  • Quinn’s relatives relayed a story about putting on a headset and seeing a digital world that they could walk around in and explo
    8·2 answers
  • What should I do I if a patient I’s bleeding th our his penis
    11·2 answers
  • Stirrups are used in a concrete beam:_______
    5·1 answer
  • Henry is given a task to divide a segment into six equal parts, using a triangle and a compass. How many arcs would he need to c
    10·1 answer
  • To ensure that a vehicle crash is inelastic, vehicle safety designers add crumple zones to vehicles. A crumple zone is a part of
    12·1 answer
  • Why is there a need for soil engineering?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!