Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Fundamental of Structures

Question 1

1950_Fundamental of Structures.jpg

a) Find the tensions of the cable CG and FG.

b) Find the reactions at A and B.

c) By the method of joints to calculate the forces of member AC and CD.

d) By the method of sections to calculate the force of member DB.

Question 2: Figure Q2a shows a stick made of aluminum. The stick is supported by a vertical force R in equilibrium as shown in Figure Q2b. Given that the density per unit length of the stick is 1kg/m.

a) Calculate the vertical force R.

b) Find the centroid of Figure Q5a.

c) Find the angle of rotation α in Figure Q5b.

1573_Density per unit length of the stick.jpg

Question 3: Figure Q3 shows a simply supported beam. The beam is pinned and roller supported at A and E, respectively. A uniform distributed load 3kN/m is applied along AB. A couple 4kNm is applied at C. A vertical concentrated force 10kN is applied at D.

a) Find all the support reaction unknowns.

b) Draw the shear force diagram along the beam AE.

c) Draw the bending moment diagram along the beam AE.

Question 4:

462_Find the reactions at A and B.jpg

a) Find the reactions at A and B.

b) Find the equations of shear force and bending along member AB.

c) Find the maximum bending moment along member AB.

Question 5:

Figure Q5 shows a truss simply supported at A and E. The truss is pinned and roller supported at A and E, respectively. A vertical concentrated force P is applied at G. If the maximum compression and tensile capacity of the truss member is 3kN and 0.8 kN, respectively, find the maximum allowable value of P. (Hint: Identify all the zero-force members)

1904_maximum allowable value.jpg

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91608689
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Penetration testing is a technique used to identify

Penetration testing is a technique used to identify security weaknesses in your network. Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

What is the name of the text file on a windows computer

What is the name of the text file on a Windows computer that may store DNS to IP address mappings?

The strfirstname and strlastname variables contain the

The strFirstName and strLastName variables contain the strings "Jane" and "Jones", respectively. Which of the following statements will display a string as "Jones, Jane" (the last name, a comma, a space, and the first na ...

A simple medium access control protocol would be to use a

A simple medium access control protocol would be to use a fixed assignment time division multiplexing (TDM) scheme. Each station is assigned one time slot per cycle for transmission. For the bus, the length of each slot ...

A compare the properties of cpu registers with the main

(a) Compare the properties of CPU registers with the main memory in MIPS.  (b) Describe the purpose of the stack pointer ($sp) for procedure calling. (c) What is a "basic block" and how is it used by a compiler? (d) Ther ...

What are some examples of when a data compression utility

What are some examples of when a data compression utility can be used for information stored on a computer's hard drive?

Question superfast software inc was founded last year by

Question : Superfast Software Inc. was founded last year by three young programmers. They all dreamed their company would become a really big one and would distribute a large number of software products all over the worl ...

Do you need computers or information and communication

Do you need computers or information and communication technologies to store, organize, and manage data in organizations? Explain how the present day organizations in a developed country like the USA store and manage the ...

What effect does the teacher have on creating a learning

What effect does the teacher have on creating a learning environment with little to no behavior problems?

Question you work for a multi-state company with three

Question: You work for a multi-state company with three sites in three different states, 1,000 employees, an ERP application with a backend database, and two datacenters. Prepare a 2 Page Disaster Recovery and Business C ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As