1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dlinn [17]
3 years ago
15

What is the mass of the same dragster body (volume of 150 cm3) if it is made of basswood instead?

Engineering
1 answer:
dusya [7]3 years ago
8 0

Answer:

the answer is 61.5

Explanation:

You might be interested in
For the following conditions determine whether a CMFR or a PFR is more efficient in removing a reactive compound from the waste
andrew11 [14]

Answer:

The PFR is more efficient in the removal of the reactive compound as it has the higher conversion ratio.

Xₚբᵣ = 0.632

X꜀ₘբᵣ = 0.5

Xₚբᵣ > X꜀ₘբᵣ

Explanation:

From the reaction rate coefficient, it is evident the reaction is a first order reaction

Performance equation for a CMFR for a first order reaction is

kτ = (X)/(1 - X)

k = reaction rate constant = 0.05 /day

τ = Time constant or holding time = V/F₀

V = volume of reactor = 280 m³

F₀ = Flowrate into the reactor = 14 m³/day

X = conversion

k(V/F₀) = (X)/(1 - X)

0.05 × (280/14) = X/(1 - X)

1 = X/(1 - X)

X = 1 - X

2X = 1

X = 1/2 = 0.5

For the PFR

Performance equation for a first order reaction is given by

kτ = In [1/(1 - X)]

The parameters are the same as above,

0.05 × (280/14) = In (1/(1-X)

1 = In (1/(1-X))

e = 1/(1 - X)

2.718 = 1/(1 - X)

1 - X = 1/2.718

1 - X = 0.3679

X = 1 - 0.3679

X = 0.632

The PFR is evidently more efficient in the removal of the reactive compound as it has the higher conversion ratio.

3 0
3 years ago
What is the measurement below?
Bess [88]

Explanation:

इसिसिसिसैस्स्स्स्स्स्स्स्स्स्सूस्सोस्स्स्स्स्स

8 0
3 years ago
Infinitivo de vivia kkk xd
blagie [28]

Answer:

pls put a question not random letters

Explanation:

8 0
3 years ago
In an orthogonal cutting operation, the tool has a rake angle = 12°. The chip thickness before the cut = 0.32 mm and the cut yie
Snezhnost [94]

Answer:

The shear plane angle and shear strain are 28.21° and 2.155 respectively.

Explanation:

(a)

Orthogonal cutting is the cutting process in which cutting direction or cutting velocity is perpendicular to the cutting edge of the part surface.  

Given:  

Rake angle is 12°.  

Chip thickness before cut is 0.32 mm.

Chip thickness is 0.65 mm.  

Calculation:  

Step1  

Chip reduction ratio is calculated as follows:  

r=\frac{t}{t_{c}}

r=\frac{0.32}{0.65}

r = 0.4923

Step2  

Shear angle is calculated as follows:  

tan\phi=\frac{rcos\alpha}{1-rsin\alpha}

Here, \phi is shear plane angle, r is chip reduction ratio and \alpha is rake angle.  

Substitute all the values in the above equation as follows:  

tan\phi=\frac{rcos\alpha}{1-rsin\alpha}

tan\phi=\frac{0.4923cos12^{\circ}}{1-0.4923sin12^{\circ}}

tan\phi=\frac{0.48155}{0.8976}

\phi=28.21^{\circ}

Thus, the shear plane angle is 28.21°.

(b)

Step3

Shears train is calculated as follows:

\gamma=cot\phi+tan(\phi-\alpha)

\gamma=cot28.21^{\circ}+tan(28.21^{\circ}-12^{\circ})\gamma = 2.155.

Thus, the shear strain rate is 2.155.

6 0
3 years ago
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
3 years ago
Other questions:
  • Explain the difference between thermoplastics and thermosets giving structure property correlation.
    5·1 answer
  • A 179 ‑turn circular coil of radius 3.95 cm and negligible resistance is immersed in a uniform magnetic field that is perpendicu
    11·1 answer
  • What is the heights part of Maine?
    5·1 answer
  • 6. PVC boxes are primarily used in new construction because it is simple to
    11·1 answer
  • Which design activity is part of the design for manufacturability (DFM) methodology?
    10·1 answer
  • If y varies inversely as x, and y =23 when x=8, find y when x=4
    14·1 answer
  • Work to be performed can come from the work package level of the work breakdown structure as well as other sources. Which of the
    11·1 answer
  • The Imager for Mars Pathfinder (IMP) is an imaging system. It has two camera channels. Each channel has color capability. This i
    7·1 answer
  • A global resources company uses data-intensive, cloud-based simulation software, but users in remote locations find that the res
    6·1 answer
  • 8. What are two ways SpaceX plans to change personal travel?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!