1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
12

A vertical piston-cylinder device initially contains 0.2 m3 of air at 20°C. The mass of the piston is such that it maintains a c

onstant pressure of 300 kPa inside. Now a valve connected to the cylinder device is opened, and air is allowed to escape until the volume inside the cylinder is decreased by one-half. Heat transfer is allowed during the process so that the temperature of the air in the cylinder remains constant. Determine (a) the amount of air that has left the cylinder and (b) the amount of heat transfer.
Engineering
1 answer:
Ann [662]3 years ago
6 0

Answer:

Amount of air left in the cylinder=m_{2}=0.357 Kg

The amount of heat transfer=Q=0

Explanation:

Given

Initial pressure=P1=300 KPa

Initial volume=V1=0.2m^{3}

Initial temperature=T_{1}=20 C

Final Volume=V_{2}=0.1 m^{3}

Using gas equation

m_{1}=((P_{1}*V_{1})/(R*T_{1}))

m1==(300*0.2)/(.287*293)

m1=0.714 Kg

Similarly

m2=(P2*V2)/R*T2

m2=(300*0.1)/(0.287*293)

m2=0.357 Kg

Now calculate mass of air left,where me is the mass of air left.

me=m2-m1

me=0.715-0.357

mass of air left=me=0.357 Kg

To find heat transfer we need to apply energy balance equation.

Q=(m_{e}*h_{e})+(m_{2}*h_{2})-(m_{1}*h_{1})

Where me=m1-m2

And as the temperature remains constant,hence the enthalpy also remains constant.

h1=h2=he=h

Q=(me-(m1-m2))*h

me=m1-me

Thus heat transfer=Q=0

You might be interested in
SSL/TLS is used for ________.
Nana76 [90]

Answer:

1.Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). SSL/TLS can be used for Web applications

2.Small malware programs that download larger malware programs are called downloaders

3. Single network addresses in different single networks are neither unique nor unique if the two single networks use the same technology standards

4. Converting application messages into bits is called encoding

5. Guarantees by a provider to meet certain delivery quality specifications are called service level agreements

6. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. They are extremely dangerous for the victim

7. In antivirus filtering, the best ways to filter currently use BEHAVIOURAL DETECTION

8. The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is SPYWARE

9. Firewall log files should be read EVERYDAY

10. When a firewall identifies an attack packet, it both discards the packet and copies information about the packet into a log file

11. IT security employees are the most difficult employees

12. In authentication, the SUPPLICANT is the party trying to prove his or her identity.

13. In a firewall, VPN traversal reduces firewall filtering effectiveness

14. DIRECTLY-PROPAGATING WORM can spread more rapidly

15 UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.

16. Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a SYN/ACK segment.

17. 802.11 data link layer standards govern neither access point operation nor frame organization

18. Credit card number thieves are called CARDERS

19. Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is CONFIDENTIALITY

20. Iris scanning is attractive because of its PRECISION

21. The source socket is 60.171.18.22:57707. The source is a CLIENT

4 0
4 years ago
What is the resolution limit for a projection type of photolithographic system if the incident wavelength is 365 nm (the i-line
Vadim26 [7]

Answer:

Depth of field  = 347.619 nm

Explanation:

wavelenght =  365nm

N.A =0.63

k1= 0.6

so we have that the resolution limit is:

R=k1*A

R=0.6*365

R=219 nm

and the Depth of field needed for the best resolution is:

DoF = Resolution / N.A.

DoF= R/N.A

DoF= 219/0.63

DoF= 347.619 nm

7 0
3 years ago
In a slowly cooled hypereutectoid iron-carbon steel, the pearlite colonies are
jek_recluse [69]

In a slowly cooled hypereutectoid iron-carbon steel, the pearlite colonies are normally separated from each other by a more or less continuous boundary layer of cementite done by Slower cooling reasons coarse Pearlite, even as rapid cooling reasons first-rate pearlite to form.

<h3>What levels is in Hypereutectoid metal?</h3>

Hypoeutectoid steels can, upon preliminary cooling from the austenite single segment field, exist as extraordinary levels, eutectoid ferrite and austenite, every with extraordinary carbon contents.

At room temperature, hypereutectoid steels have a pearlitic primary microstructure (ferrite grains with embedded cementite lamellae) with moreover induced cementite on the grain boundaries! The micrograph under suggests a hypereutectoid metal with 1.0 Carbon (C100).

Read more about the cementite:

brainly.com/question/24924853

#SPJ1

7 0
2 years ago
12. Which of the following letter doesn't still the same when its viewed
Mashcka [7]

Answer:

the correct answer is option B. W

3 0
3 years ago
Read 2 more answers
Explain biometric senser.​
Contact [7]

Biometric sensors are used to collect measurable biological characteristics from a human being, which can then be used in conjunction with biometric recognition algorithms to perform automated person identification.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Brittle failure is a type of failure in which: (a) There is large amount of plastic deformation (b) Large amount of elastic defo
    5·1 answer
  • Suppose that H1(s) and H2(s) are two strictly proper singleinput, single-output transfer functions with controllable statespace
    8·1 answer
  • Resistance in a circuit that has 35 mA of current and 5.6 V applied equals.
    9·1 answer
  • how to take care of a kid?? this kid is begging me to do something i dont want to help please its a 5yo
    13·1 answer
  • A 20 mm diameter cylindrical rod fabricated from a 2014-T6 alloy is subjected to repeated tension-compression load cycling along
    12·1 answer
  • How many parts (screws and bolts included) does the average car have?
    9·2 answers
  • Describe the engineering design process in your own words.
    6·2 answers
  • If the driver gear has 5 teeth and the driven gear has 10 teeth,what is the gear ratio?​
    13·2 answers
  • Can someone help me with this maze shown below.
    8·1 answer
  • PLEASE I NEED HELP!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!