Problem regarding the matrix tensile strength

Assignment Help Basic Computer Science
Reference no: EM131086115

Compute the longitudinal strength of an aligned carbon fiber-epoxy matrix composite having a 0.25 volume fraction of fibers,assuming the following: (1) an average diameter of 20x10-3 mm,(2)an average fiber length of 5mm,(3) a fiber fracture strength of 2.5GPa ,(4) a fiber matrix bond strength of 90 MPa, (5) a matrix stress at fiber failure of 10.0 MPa,and (6) a matrix tensile strength of 80MPa.

Reference no: EM131086115

Questions Cloud

The predictive power of the heckscher-ohlin model : The predictive power of the Heckscher-Ohlin model, at least in terms of forecasting the volume of trade, appears to undergo improvement upon abandonment of the assumption. The gravity model states that trade between two countries will increase if the..
Describe key concepts in marketing research problem approach : Describe key concepts to be used in the marketing research problem approach.
Calculate the angle in radians : Write a script that will prompt the user for an angle in degrees. It will then calculate the angle in radians, and then print the result. Note: radians = 180 °.
Give an algorithm to record global state : Consider a distributed system where every node has its physical clock and all physical clocks are perfectly synchronized.
Problem regarding the matrix tensile strength : Compute the longitudinal strength of an aligned carbon fiber-epoxy matrix composite having a 0.25 volume fraction of fibers,assuming the following:
Nominal gross domestic product : Suppose 2009 is the base year. From 2009 to 2010, the price index increased from 100 to 102.5. if nominal Gross Domestic Product (GDP) is $2,800 in 2010, then the real Gross Product (GDP) in 2010 is
Two representative consumers with endowments : Analyze the following economy (two goods,two periods,two representative consumers with endowments).. Xavier has Cobb-Douglas preferences over consumption today (A1 for apples today) and tomorrow (A2) of the form UX=.51 log(A1 ) + .49 log(A2 ). He beg..
Discuss the freedom of speech section : Discuss the freedom of speech section of the First Amendment to the US constitution and its protection and permitted regulation, of the commercial and political speech engaged in by busniness, including justification for such regulations
Determine its density upon heating : When a metal is heated its density decreases. There are two sources that give rise to this diminishment of ρ: (1) the thermal expansion of the solid, and (2) the formation of vacancies. Consider a specimen of gold at room temperature (20?C) that ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Idea fits the criteria.

In our pre-writing assignments, we generally propose more than one idea but for this one you should focus on one idea.  Review the attached assignment for the essay before proceeding to make sure that your idea fits the criteria.  Also, keep in mind ..

  Identify at least six examples of threats to information

Identify at least six examples of threats to information security

  What effect does font selection have on readability

What effect does font selection have on readability and the viewer's perception and How does the use of font further or hinder the intended message?

  Improving the business operation

1) What is strategic information? 2) Why were all the past attempts by IT to provide strategic information fails? List three concrete reasons and explain. 3) An effective decision helps the manager to perform better in improving the business operatio..

  Outline what sort of redundancy will result if we do so

Outline what sort of redundancy will result if we do so.

  Choose your own adventure

Use java to write a program that allows the user to play a "Choose Your Own Adventure" game.  In this game the user will be prompted with making decisions, which will then lead them to different paths with different results.Requirements:There must be..

  Create a new file called testwork

Create a new file called TestWork.scr. Change the permissions on this new file to add the execute bit for user, group, and owner.

  Why are you normally required to bind a service

What steps need to be taken by a network service to be ready to receive TCP/IP connections? Why are you normally required to bind a service to a specific port?

  What is the order of the bucket sort

What is the order of the bucket sort? Why is the bucket sort not useful as a general sorting algorithm?

  Intrusion detection system on a virtual machine

How do you Install SNORT Intrusion detection system on a virtual machine using Mint and configure it to create a simple rule which generates an alert each time a specific website is visited from that virtual machine (e.g. www.yahoo.com).

  Define a forest root domain in your own words

Define a forest root domain in your own words.Define a forest root domain in your own words.

  Do you think such circumstances are likely

Can you think of any error distribution in which AAL3/4 would be more likely than AAL5 to detect an error? Do you think such circumstances are likely?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd