Mechanical Engineering Materials
User Generated
gbz2928
Other
Description
a medium carbon annealed steel rod has a rectangle cross section and must cope with tension of 3 tonnes. the thickness of the rod is 15mm. Calculate the size of the cross section
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
12 pages
Statistics Assignment
The data contains multiple variables include the students’ major, gender, employment status, number of hours studied, an ...
Statistics Assignment
The data contains multiple variables include the students’ major, gender, employment status, number of hours studied, and BS-GPA. The research is ...
3 pages
Socw6070 Week Four Discussion
Post how you, as a social worker, might interpret the needs of Paula Cortez, the client, Paula is pregnant, mentally ill, ...
Socw6070 Week Four Discussion
Post how you, as a social worker, might interpret the needs of Paula Cortez, the client, Paula is pregnant, mentally ill, and lacks social support. ...
Hacking Theory Paper
Assignment 2: Hacking TheoryDue Week 6 and worth 75 pointsWrite a paper in which you:Explain the various forms of social e ...
Hacking Theory Paper
Assignment 2: Hacking TheoryDue Week 6 and worth 75 pointsWrite a paper in which you:Explain the various forms of social engineering tactics that hackers employ and provide a recent example of each. Describe the five social norms of hacker subculture and provide an example of each.Search Internet news sources and find a recent article (less than 1 year old) on hacking. Describe the tone in regard to hacking and explain what the article conveys in regard to stigmas and labels surrounding the hacker.Go to https://research.strayer.edu to locate at least three (3) quality references for this assignment. One must have been published within the last year. Note:Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements:This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Describe the technologies and processes involved in digital forensics.Explain the ethical concerns that information technologies raise in society and the impact of information technologies on crime, terrorism, and war.Use technology and information resources to research issues in information technology in criminal justice. Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style conventions.
10 pages
Your Creativity Toolkit Tools To Map Problems And Ideas
Every professional in every profession experience different types of challenges. The severity of the challenges depends on ...
Your Creativity Toolkit Tools To Map Problems And Ideas
Every professional in every profession experience different types of challenges. The severity of the challenges depends on the position that an ...
6 pages
John Deere Company
John Deere Company’s mission is to deliver services to farmers, ranchers, landowners and builders and always ensuring th ...
John Deere Company
John Deere Company’s mission is to deliver services to farmers, ranchers, landowners and builders and always ensuring they honor their core values. ...
Similar Content
Describe how the State of Virginia, North Carolina and West Virginia regulate voting, homework help
Describe how the State of Virginia, North Carolina and West Virginia regulate voting, elections, and campaign finance. Sim...
Germans Support on The Natzi Party Question
Question 1
What were the various reasons why Germans joined the Nazi party and supported Hitler?
Question 2
Once est...
KEL 319 Kellogg School of Management Air France Internet Marketing Questions
...
What are the pros and cons of new actors on the international stage?, assignment help
Enhanced communication has allowed for the growth of “networks” of organizations. What are the pros and cons of ...
SPED 3305 Sam Houston State University Task Analysis Techniques Paper
Collecting and analyzing classroom data to make educational decisions is a key skill for any teacher. Classroom assessment...
SPD 200 Grand Canyon University Multi Tiered Intervention Presentation
Tiered instruction and support programs are often implemented on a school or district-wide level. Response to Intervention...
The Emergence Of An Underestimated Threat Chikungunya And Zika Viruses
The Emergence of an Underestimated Threat: Chikungunya and Zika Viruses The World Health Organization’s Country Cooperat...
Sex Education Final Answer1
Sex is a sensitive topic to be discussed in the society despite civilization taking place. Sex have strongly prohibited am...
Child Labor Multiple Viewpoints
A report by UNICEF ascertains that a total of 152 million children (88 million boys and 64 million girls) are projected to...
Related Tags
Book Guides
Treasure Island
by Robert Louis
Unf*ck Yourself
by Gary John Bishop
Into the Wild
by Jon Krakauer
Alice in Wonderland
by Lewis Carroll
To Kill a Mockingbird
by Harper Lee
The Prince
by Niccolò Machiavelli
Crime and Punishment
by Fyodor Dostoyevsky
Cant Hurt Me - Master Your Mind and Defy the Odds
by David Goggins
The Dispossessed
by Ursula Kroeber Le Guin
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
12 pages
Statistics Assignment
The data contains multiple variables include the students’ major, gender, employment status, number of hours studied, an ...
Statistics Assignment
The data contains multiple variables include the students’ major, gender, employment status, number of hours studied, and BS-GPA. The research is ...
3 pages
Socw6070 Week Four Discussion
Post how you, as a social worker, might interpret the needs of Paula Cortez, the client, Paula is pregnant, mentally ill, ...
Socw6070 Week Four Discussion
Post how you, as a social worker, might interpret the needs of Paula Cortez, the client, Paula is pregnant, mentally ill, and lacks social support. ...
Hacking Theory Paper
Assignment 2: Hacking TheoryDue Week 6 and worth 75 pointsWrite a paper in which you:Explain the various forms of social e ...
Hacking Theory Paper
Assignment 2: Hacking TheoryDue Week 6 and worth 75 pointsWrite a paper in which you:Explain the various forms of social engineering tactics that hackers employ and provide a recent example of each. Describe the five social norms of hacker subculture and provide an example of each.Search Internet news sources and find a recent article (less than 1 year old) on hacking. Describe the tone in regard to hacking and explain what the article conveys in regard to stigmas and labels surrounding the hacker.Go to https://research.strayer.edu to locate at least three (3) quality references for this assignment. One must have been published within the last year. Note:Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements:This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Describe the technologies and processes involved in digital forensics.Explain the ethical concerns that information technologies raise in society and the impact of information technologies on crime, terrorism, and war.Use technology and information resources to research issues in information technology in criminal justice. Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style conventions.
10 pages
Your Creativity Toolkit Tools To Map Problems And Ideas
Every professional in every profession experience different types of challenges. The severity of the challenges depends on ...
Your Creativity Toolkit Tools To Map Problems And Ideas
Every professional in every profession experience different types of challenges. The severity of the challenges depends on the position that an ...
6 pages
John Deere Company
John Deere Company’s mission is to deliver services to farmers, ranchers, landowners and builders and always ensuring th ...
John Deere Company
John Deere Company’s mission is to deliver services to farmers, ranchers, landowners and builders and always ensuring they honor their core values. ...
Earn money selling
your Study Documents