1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
4 years ago
8

2.4 kg of nitrogen at an initial state of 285K and 150 kPa is compressed slowly in an isothermal process to a final pressure of

600 kPa. Determine the work.
Engineering
1 answer:
Neko [114]4 years ago
8 0

Answer:

W=-280.67 KJ

Explanation:

Given that

Initial pressure = 150 KPa

Final pressure = 600 KPa

Temperature T= 285 K

Mass m=2.4 Kg

We know that ,work in isothermal process given as

W=mRT\ ln\dfrac{P_1}{P_2}

Gas constant for nitrogen gas R=0.296 KJ/kgK

Now by putting the values

W=mRT\ ln\dfrac{P_1}{P_2}

W=2.4\times 0.296\times 285\ ln\dfrac{150}{600}

W=-280.67 KJ

Negative sign indicates that it is compression process and work is done on the gas.

You might be interested in
What is the saturation pressure, Vf, and Vg for saturated water at a temperature of 287 °C?
Dvinal [7]

Answer:

Vf = specific volume of saturated liquid  = 0.0217158 ft^3/lb

Vg = specific volume of saturated steam = 0.430129 ft^3/lb

Explanation:

Given data:

water temperature is given as 287-degree Celcius

we have to find Vf and Vg

Vf = specific volume of saturated liquid  

Vg = specific volume of saturated steam

we know that from the saturated steam table we can find these value

therefore for temperature 287-degree Celcius

Vf = specific volume of saturated liquid  = 0.0217158 ft^3/lb

Vg = specific volume of saturated steam = 0.430129 ft^3/lb

6 0
3 years ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
An engine operates on gasoline (LHV=44 MJ/kg) with a brake thermal efficiency of 37.9 % What is the brake specific fuel consumpt
scZoUnD [109]

Answer:

s =0.21\ kg/Kw.hr

Explanation:

Given that

Calorific value (CV) = 44 MJ/Kg

CV= 44,000 KJ/kg

Brake thermal efficiency(η) = 37.9 %

We know that

\eta =\dfrac{BP}{\dot{m_f}\times CV}

Where BP is the brake power

\eta =\dfrac{BP}{\dot{m_f}\times CV}

0.379 =\dfrac{BP}{\dot{m_f}\times 44000}

\dfrac{BP}{\dot{m_f}}=16676

Brake specific fuel consumption (s)

s =\dfrac{\dot{m_f}}{BP}

s =\dfrac{3600\times \dot{m_f}}{BP}

s =\dfrac{3600}{16,676}\ kg/Kw.hr

s =0.21\ kg/Kw.hr

7 0
3 years ago
An inductor of ????=6.95 H with negligible resistance is placed in series with a ℰ=12.5 V battery, a ????=3.00 Ω resistor, and a
elena-14-01-66 [18.8K]

Answer:

a) I=0 b) 4.17V c) 0.354 A d) 14.5s

Explanation:

a) consider circuit in the attachment

i(t)= E/R (1- e^(-t/RL))

i(0)= 12.5/3×(1-e^(0/RL))

i(0)=0

b) at t⇒∞

i(∞)= 12.5/3× (1- e^(-∞/RL))

    = 4.17V

c) 1/RL= 1/(6.95×3)= 0.0479616

i(1.85) = 12.5/3 × (1- e^(-1.85×0.0479616)

         = 0.354A

d) I/2= I (1- e^(-t/RL))

t= - RL ln0.5

t= - 3×6.95 × (-0.693)

t= 14.5 s

8 0
4 years ago
Two engineers are discussing the various merits of hydroelectricity. Engineer A says that tidal barrage systems can generate ele
denpristay [2]

Answer:

they are both right

Explanation:

3 0
3 years ago
Other questions:
  • Why do we study economics
    13·1 answer
  • Carbon dioxide (CO2) at 1 bar, 300 K enters a compressor operating at steady state and is compressed adiabatically to an exit st
    11·1 answer
  • The given family of functions is the general solution of the differential equation on the indicated interval.Find a member of th
    11·1 answer
  • Determine whether each of the following statements is true, false, or uncertain. Explain your answers. A decision maker seldom k
    14·1 answer
  • In which order are the following measuring instruments listed from lowest precision to highest precision:
    12·1 answer
  • Which of the following actions by farmers contributes to desertification?
    6·1 answer
  • A 5.74 kg rock is thrown upwards with a force of 317 N at a location where the local gravitational acceleration is 9.81 m/s^2. W
    10·1 answer
  • At a certain section in a pipeline, a reducer is used to reduce the diameter from 2D gradually to diameter D. When an incompress
    12·1 answer
  • Technician A says that a fully charged battery is less likely to freeze than a discharged battery. Technician B says that the st
    8·1 answer
  • Multiple Choice
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!