What is the maximum height of the ball

Assignment Help Basic Computer Science
Reference no: EM131350211

Sports Suppose a punter kicks a football so that the upward component of its velocity is 80 feet per second. If the ball is 3 feet off the ground when it is kicked, then the height of the ball, in feet, t seconds after it is kicked is given by h(t) = 3 + 80t - 16t2.

a. Find the upward velocity v(t) of the football.

b. How fast is the ball travelling upward 1 second after it is kicked?

c. Find the time when the ball reaches its maximum height.

d. What is the maximum height of the ball?

Reference no: EM131350211

Questions Cloud

Evaluate a limit that arises in the computation : You will need a calculator to evaluate a limit that arises in the computation.)
Requirements for medicare reimbursement : Identify 3 tools from the CMS Web site that are helpful in meeting the requirements for Medicare reimbursement set forth by CMS.
Evaluate the factors that influence food habits and culture : 421: Describe and evaluate some of the major factors that have been influencing the supply and demand for food in recent years. What are the main reasons for some of these factors? You could include such topics as food scarcity, food prices ..
Verbal-nonverbal and vocal delivery : Considering your content; organization; physical, verbal, nonverbal, and vocal delivery; and multimedia, what did you do well in the presentation?
What is the maximum height of the ball : Sports Suppose a punter kicks a football so that the upward component of its velocity is 80 feet per second. If the ball is 3 feet off the ground when it is kicked, then the height of the ball, in feet, t seconds after it is kicked is given by h(t..
Establish long-term goals and objectives : Establish Long-term Goals and Objectives Strategy Formulation. Indicate the markets that the company will pursue. Specify the unique value the company will offer in the selected markets.
Produces a commercial product : XYZ Corporation produces a commercial product that is in great demand by consumers on a national basis. Unfortunately, near the plant where it is produced there is a large population of dove-tail turtles who are adversely affected by contaminants ..
Find the area between each curve : Refer to Exercise 13 of Lesson 15-2. Use the marginal cost function to approximate the cost for the company to produce one more widget when the production level is 20 widgets.
Mentor to personal growth within career : How important is a mentor to personal growth within your career? How do you find a mentor? Does that person need to work inside the organization with you? Or work outside and be an objective third party?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a distributed web crawler and indexer

Create a distributed web crawler and indexer. Your application should make use of a system that uses multiple crawler processes to traverse a set of websites and process or organize the data in a way that is easy to search.

  Advantages would in istributing the hierarchical directors

Discuss how the distributed director architecture of AAFID could be combined with the hierarchical structure of the directors of GrIDS.

  Programming problems using modular

Solve programming problems using modular, structured programming. Describe and use sequence, branching, and iteration (loops) logic structures. Construct arrays and menus.

  Compare a filtering firewall to a proxy firewall

Assume a configuration as in Figure 8.21, where the internal host under attack trusts the remote company user.

  Chronology of the development of the internet

1) When looking at the chronology of the development of the Internet, which development do you believe to be the most important? Why?

  Identity before the third message was received

o what attack might a server be exposed if it trusted the client's identity before the third message was received?

  What patterns would hash to the same location

The hash table is 10,000 entries long (HASH_TABLE_SIZE is 10000). The search keys are integers in the range 0 through 9999. The hash function is given by the following C++ function:

  Find a description of a software development process

Find a description of a software development process, preferably with a description on the web.

  Assignment-incident response revamp

Imagine you have just taken over the manager position for your organization's incident response team, after coming from another division in the company. Your first realization is that proper procedures, best practices, and sound technologies are n..

  Interacting and communicating with other people

Interacting and communicating with other people is part of daily life. This includes face-to-face conversations, conversations over the phone or other mobile devices, and conversations through social media.

  Convey the meaning of the poem? chat conversation end

Write Poem Analysis essay, Works Cited, and Copy of Poem (with line numbers). Also, copy and paste your entire essay into the body of the thread. Essay: 3 pages in MLA format,use 3-5 in-text (short) citations and 1-2 block (long) quotations. You also..

  Implement a double-ended priority queue

1. Generalize the preceding exercise to obtain a k-d heap, in which each item can have k individual keys. You should be able to obtain the following bounds: insert in O(log N), deleteMin in O(2k log N), and buildHeap in O(kN). 2. Show that the k-d he..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd