1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
13

The mechanical properties of a metal may be improved by incorporating fine particles of its oxide. Given that the moduli of elas

ticity of the metal and oxide are, respectively, 60 GPa and 380 GPa, what is the (a) upper-bound, and (b) lower-bound modulus of elasticity values (in GPa) for a composite that has a composition of 33 vol% of oxide particles.
Engineering
1 answer:
mojhsa [17]3 years ago
3 0

Answer:

A) Upper bound modulus of elasticity; E = 165.6 GPa

B) Lower bound modulus of elasticity; E = 83.09 GPa

Explanation:

A) Formula for upper bound modulus is given as;

E = E_m(1 - V_f) + E_f•V_f

We are given;

E_m = 60 GPa

E_f = 380 GPa

V_f = 33% = 0.33

Thus,

E = 60(1 - 0.33) + 380(0.33)

E = (60 x 0.67) + 125.4

E = 165.6 GPa

B) Formula for lower bound modulus is given as;

E = 1/[(V_f/E_f) + ((1 – V_f)/E_m)]

E = 1/[(0.33/380) + ((1 – 0.33)/60)]

E = 1/(0.0008684 + 0.01116667)

E = 1/0.01203507

E = 83.09 GPa

You might be interested in
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
How to write the name (ELAF ADNAN) by using G-codes in milling machine ?? Please help
mel-nik [20]

Answer:

Simple G Code Example Mill - This is a very simple G code example for beginner level ... Run the program on your cnc machine (Safety first, keep a professional around). ... This G code program example don't use Tool radius compensation ...

Explanation:

3 0
3 years ago
Which of the following types of valves have a valve stem that moves up and down in a valve guide? Select one: a. Poppet valves b
Alja [10]

Answer:c

Explanation:

thats wht it is

5 0
3 years ago
Read 2 more answers
This graph shows the US unemployment rate from<br> August 2010 to November 2011
MrRissso [65]

The graph could help an economist predict that how many people will be out of work in the next year. The correct option is c.

<h3>What is unemployment?</h3>

Unemployment is the condition where people who have knowledge or eligible for doing job, but they are not getting job. Unemployment is the scarcity of jobs.

The options are attached:

a. how the government will address unemployment.

b. why workers might have a harder time finding jobs.

c. how many people will be out of work in the next year.

d. why producers might hire fewer workers in the future.

Thus, the correct option is c. how many people will be out of work in the next year.

Learn more about unemployment

brainly.com/question/14227610

#SPJ1

3 0
1 year ago
Which of the following distinguishes the importance of engineering to the field of sports biomechanics?
Lisa [10]
The first one and the second i’m glad to help
8 0
3 years ago
Other questions:
  • What are the three main areas of bioengineering?
    11·1 answer
  • You are evaluating the lifetime of a turbine blade. The blade is 4 cm long and there is a gap of 0.16 cm between the tip of the
    9·1 answer
  • The depletion in the Ozone layer is caused by:
    14·2 answers
  • The structure of PF3(C6H5)2 is trigonal bipyramidal, with one equatorial and two axial F atoms which interchange positions when
    15·1 answer
  • What do you think causes the differences in the properties of oxygen gas (O2) and ozone (O3)? the space between the atoms the ra
    9·1 answer
  • Select the correct answer. Which existing technology did engineers use to enhance the speed of propeller-driven airplanes
    11·1 answer
  • Please help me. I have no idea what I'm doing.​
    14·2 answers
  • A. The ragion was colonized by European powers
    6·1 answer
  • What is the tolerance of number 4?
    12·1 answer
  • PLS HELP!!!
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!