What is the heat transfer rate from the steam line

Assignment Help Basic Computer Science
Reference no: EM131240434

An overhead 25-m-long, uninsulated industrial steam pipe of 100 mm diameter is routed through a building whose walls and air are at 25°C. Pressurized steam maintains a pipe surface temperature of 150°C, and the coefficient associated with free convection is h = 10 W/m2 . K . The surface emissivity is ε = 0.8. What is the heat transfer rate from the steam line? Would applying a low emissivity coating (ε = 0.10) to the pipe exterior surface change the heat transfer rate significantly?

Reference no: EM131240434

Questions Cloud

Read a symmetric matrix from a text file : Your program should read a symmetric matrix from a text file that describes weighted edges of an undirected, connected graph and find the MST that is saved in an output file as a sequence of edges of the MST. The program also displays the numbers ..
How migration flows and urbanization were connected : Describe the general trend known as "cultural modernism" in the industrial world during the late 19th and early 20th centuries, with reference to at least two major characteristics of that trend (in different contexts such as literature, philosoph..
Determine the amount of income taxable in the united states : Determine the amount of income taxable in the United States, assuming that Bahamamama makes 20% of its sales in the Bahamas and 80% in other countries.
Ethical concerns that drones bring to warfare : What are some of the ethical concerns that drones bring to warfare? Are they internationally legal? (at least 200 word minimum)
What is the heat transfer rate from the steam line : The surface emissivity is ε = 0.8. What is the heat transfer rate from the steam line? Would applying a low emissivity coating (ε = 0.10) to the pipe exterior surface change the heat transfer rate significantly?
Design of a hydroelectric dam : Write a program to assist in the design of a hydroelectric dam. Prompt the user for the height of the dam and for the number of cubic meters of water that are projected to flow from the top to the bottom of the dam each second.
How building from our weekly learning and readings : How were religious subjects treated by Baroque artists, writers and/or musicians? Include specific examples to support your view on this topic, and how building from our weekly learning, readings? How are religious subjects treated toda.
Determine cumulative effect adjustment to retained earnings : Using the information in Question 8, determine the cumulative effect adjustment to Retained Earnings that Sparky will recognize in the journal entry to record this accounting change.
What is its surface temperature : A spherical interplanetary probe of 0.5-m diameter contains electronics that dissipate 150 W. If the probe surface has an emissivity of 0.8 and the probe does not receive radiation from the sun or deep space, what is its surface temperature?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Is this development good or bad for the software industry

What recent developments have challenged the reverse engineering of software in the United States? Is this development good or bad for the software industry? Why?

  Why are they both important to game development explain

In an array of characters we saw that NULL is important in defining where the end of the string is. As we keep looking further and further into strings (both array and string) why is NULL important? With two different types of NULL, why are they both..

  Questions based on computer science

Which of these statements are true, for propositional logic? (In an exam you would have to justify your answers). A. If a formula is not satisfiable then it is not valid B. X is not satisfiable if and only if ¬X is valid C. If a formula is not valid ..

  Describe ui best practices and principles

Describe UI best practices and principles. Provide examples of a few principles that you come across. Provide examples of good and poor UI design.

  Generates all the possible n-node binary tree configurations

Implement a function that generates all the possible N-node binary tree configurations. The value N is a parameter to the function and the function should return a list of binary tree. Any container ADT (list, queue, vector, etc...) can be used to st..

  Describe the implementation of secure sockets layer (ssl)

As the Information Systems Security Officer for your large health care company, you have been assigned the task of implementing Web security. Determine how you would implement security to eliminate single points of failure.

  Possible for a data set

Discuss whether it is possible for a data set to consist only of anomalous objects, or if it is an abuse of the terminology? Cite the sources you use to make your response.

  Objects modelled in collective outlier detection

What are the attributes, and what are the contextual and behavioural attributes? How is the relationship among objects modelled in collective outlier detection?

  Which data is recorded about the movie industry

Production companies are identified by name and each has an address. A production company produces one or more movies.Design an Entity-Relationship diagram for the movie database and enter the design using a data modeling tool such as ERwin or Rati..

  Recognize a physical dfd compared to a logical dfd

How would you recognize a physical DFD compared to a logical DFD? How do physical processes in a physical DFD differ from logical processes in a logical DFD? Give an example.

  Twos complement arithmetic

Show 6910 and -11210 in 8-bit binary two's complement arithmetic and then add the numbers.

  What is the encryption of m=34

What is theencryption of m=34?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd