1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
15

A canister is released from a helicopter 500m above the ground. The canister is designed to withstand an impact speed of up to 1

00 m/s. (
a) Ignoring air resistance, find an equation of the height at any time t.
(b) Find the impact speed of the canister.
(c) Your answer to (b) should be less than 100 m/s. Rather than just releasing it, let’s see if we could break it by throwing it down with an initial velocity.
Re-do parts (a) and (b) with an initial velocity v0, then find the value of v0 required to break the canister.
Computers and Technology
1 answer:
Lisa [10]3 years ago
7 0

Answer:

a) h = 1/2 gt² b) 99 m/s c) 14.1 m/s

Explanation:

a) As the only force acting on the canister once released is gravity, as it is constant, we can use one of the kinematic equations, as follows:

h = h₀ + v₀t + 1/2a t²

As we are told that the canister is simply released, it means that v₀ =0.

If we choose the direction of the acceleration (downward) as positive ,and we select the height at which it was released as our origin, so h₀ =0, the final expression for height is as follows:

h = 1/2 g t²

b) Combining this equation with the expression of t, from the definition of acceleration as the rate of change of velocity, we arrive to this expression:

vf² - v₀² = 2 g h  

As v₀ = 0, we have v₀ = √2.g.h = √2.9.8.500 m²/s² = 99 m/s

c) In order to be able to break the canister, impact speed must be larger than 100 m/s.

So, we can use the same equation as above, putting vf=100 m/s, and solving for v₀, as follows:

v₀² = vf² - 2.g.h = 100² m²/s² - 2.9.8.500 m²/s² = 200 m²/s²

v₀ = √200 m²/s² = 14.1 m/s

For any value of v₀ just barely larger than this, the canister will be broken.

You might be interested in
________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
Dmitriy789 [7]
Hi!

When someone repeatedly compares passwords to lists of common words, this is known as the dictionary attack.

We call it this because they are <em>literally </em>using a dictionary to attack you!

Hopefully, this helps! =)
7 0
3 years ago
Hello 10 points if my Chromebook is on 26 percent how much time do I have left theoretically
velikii [3]
About 15 minutes.......
7 0
3 years ago
Read 2 more answers
There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
Lana71 [14]

Answer:

i dont know i am 13

Explanation:

3 0
3 years ago
Please Help!!!<br> I keep getting this answer wrong
IgorC [24]

Answer:

I think its option a. and d.

Explanation:

option a. is right I'm sure.

option b. and c. are doubtful for me.

option d. can be true. but unlike a job letter, resumes carry a deeper view of the employee's accomplishments and qualifications.

but I still hold with option a. and b. if it's wrong please do inform, so I can refer.

5 0
3 years ago
The open items on your computer are displayed here. menu bar open bar taskbar toolbar
Dennis_Churaev [7]
Maybe the answer is the Taskbar?
8 0
3 years ago
Read 2 more answers
Other questions:
  • In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
    9·1 answer
  • the equation t= 0.25d^1/2 can be used to find the number of seconds, t, that it takes an object to fall a distance of d feet how
    8·1 answer
  • If a function needs to return more than one value, as a rule of good programming style, you should change it to a(n) ___________
    6·1 answer
  • Each professional association has
    7·1 answer
  • How can you crop a photo in PowerPoint?
    15·2 answers
  • What statement best describes operating systems?
    12·1 answer
  • Please help!!!
    9·2 answers
  • What is the meaning of antimonographycationalis​
    9·2 answers
  • Difference between hacking and cracking not hackers and crackers ​
    10·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!