Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Compute minimum value of the horizontal force:
Block A of weight 520N rest on horizontal top of block B having weight of 700N as shown in the figure given below. Block A is tied to support C by cable at 300 horizontally. The coefficient of friction is 0.4 for all the contact surfaces. Compute minimum value of the horizontal force P only to move the block B. How much is the tension in cable then.
Sol.: Consider First free body diagram of block A
∑H = 0
µR1 = Tcos30°
0.4R1 = 0.866T
R1 = 2.165T ...(i)
∑V = 0
W = R1 + Tsin30°
520 = 2.165T + 0.5T
520 = 2.665T
T = 195.12N ...(ii)
Putting in equation (i) we get
R1 = 422.43N ...(iii)
Consider First free body diagram of block A
R2 = R1 + WB
R2 = 422.43 + 700
R2 =1122.43N ...(iv)
P = µR1 + µR2
P = 0.4(422.43 + 1122.43)
P = 617.9N .......ANS
What is the purpose of putchar function Putchar writes one character to the standard output file, stdout. Syntax #include int putchar(int c); The putchar macro wr
SET SCREEN With SET SCREEN the present screen simply specifies the next screen in the chain , control branches to this next screen as soon as the current screen has been proce
zero, one, two three address instructions
How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to
Structure of Internet Servers Address Structure of an Internet server's address keyed into a client's software is as below: http://www.expertsmind.com Where: htt
usability of union
Associative Memory Organisations The associative memory is organised in w words with b bits per word. In w x b array, every bit is known a cell. Each cell is made up of a flip-
How the at-user command serves mainly in lists? The AT USER-COMMAND event serves mostly to handle own function codes. In this case, you should make an individual interface wit
what is the code to detect image forgery using Matlab..??
Can we call reports and transactions from interactive reporting lists? Yes. It also permits you to call transactions or other reports from lists. These programs then use val
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd