Description
A satellite has a mass of 106 kg and is located at
(a) What is the potential energy associated with the satellite at this location?
The response you submitted has the wrong sign. J
(b) What is the magnitude of the gravitational force on the satellite?
N
The response you submitted has the wrong sign. J
(b) What is the magnitude of the gravitational force on the satellite?
N
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you for the opportunity to help you with your question!
a) U = m g' (R + h) – m g R = m g R²/(R+h) – m g R
U = m g R (R/(R+h) – 1) = - m g R h/(R+h)
U = - 106 * 9.8 * 6371000 * 2.03*10^6/(6371000 + 1.97 10^6)
U = - 793.45*10^6 J
b) F = m g' = m g R²/(R+h)² = 106 * 9.8 * 6371000²/(6371000 + 1.97 10^6)² = 597.43 N
Completion Status:
100%
Review
Review
Anonymous
Great! 10/10 would recommend using Studypool to help you study.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
7 pages
Data Mining
1. Show that the entropy of a node never increases after splitting it into smaller Let Y = {y1, y2, ···, yc} denote the ...
Data Mining
1. Show that the entropy of a node never increases after splitting it into smaller Let Y = {y1, y2, ···, yc} denote the c classes and X = {x1, x2, ...
CE 320 ECC Principle of Virtual Work for Calculating Beam Deflections and Slopes Exam
It's take home question 2 parts about ( Principle of Virtual Work for Calculating Beam Deflections and Slopes )it will be ...
CE 320 ECC Principle of Virtual Work for Calculating Beam Deflections and Slopes Exam
It's take home question 2 parts about ( Principle of Virtual Work for Calculating Beam Deflections and Slopes )it will be similar to the attached files. it's going to be in 30 hours. and i have an hour to submit the answer.
Cumberlands Advantages & Disadvantages of Digital Signatures Discussion
After reading chapter 13, analyze the advantages and disadvantages of digital signatures. You must use one scholarly refe ...
Cumberlands Advantages & Disadvantages of Digital Signatures Discussion
After reading chapter 13, analyze the advantages and disadvantages of digital signatures. You must use one scholarly reference here.
Southern New Hampshire University Security Breach Analysis
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be ...
Southern New Hampshire University Security Breach Analysis
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security (CIS) critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization towards compliance. They are not meant to be used in isolation. Comparing an organization’s technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders. Prompt After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below: I. Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders). A. Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use. II. Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified either by policy, implementation, automation, or reporting to enhance security for the organization. A. Subcontrol One: Describe the modification of the subcontrol and justify your recommendation. B. Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation. III. Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication. A. Discuss the merits of using RSA encryption and the implementation of two-factor authentication. B. Discuss how different forms of encryption may be used in VPN software.
Similar Content
University of Colorado Colorado Springs Week 3 Slabs and Beams Loads Worksheet
Critical Thinking Assignment
Solve the following problem using pen and paper, and then upload the scanned version of the
s...
Rutgers University The Impact of Automation on the Future of Jobs Essay
650 word to be put and citations included regarding the quotes/ examples used in the paper supporting the facts written so...
Digital Communications.
its a lab i will post everything you need in the attach and if anyone is good at this course just contact me here ...
CNWCC Amazon Web Services Training and Certification Discussion
This week’s discussion is going to be quite different from previous classes. You will actually create an account w...
UDC Aerospace Practicum nXCAD Model Questions
Here it is assignment
HW3 AEE 1202.pdf ...
i want someone to help me do my Electronic homework
i want someone to help me do my Electronic homework, i need to chat with him in Whatapp. ...
Related Tags
Book Guides
The Russian Hoax
by Gregg Jarrett
What Happened
by Hillary Clinton
Things That Matter
by Charles Krauthammer
The Great Gatsby
by Francis Scott Key Fitzgerald
Calypso
by David Sedaris
The Second Sex
by Simone de Beauvoir
Mrs Dalloway
by Virginia Woolf
The Glass Castle
by Jeannette Walls
Jane Eyre
by Charlotte Brontë
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
7 pages
Data Mining
1. Show that the entropy of a node never increases after splitting it into smaller Let Y = {y1, y2, ···, yc} denote the ...
Data Mining
1. Show that the entropy of a node never increases after splitting it into smaller Let Y = {y1, y2, ···, yc} denote the c classes and X = {x1, x2, ...
CE 320 ECC Principle of Virtual Work for Calculating Beam Deflections and Slopes Exam
It's take home question 2 parts about ( Principle of Virtual Work for Calculating Beam Deflections and Slopes )it will be ...
CE 320 ECC Principle of Virtual Work for Calculating Beam Deflections and Slopes Exam
It's take home question 2 parts about ( Principle of Virtual Work for Calculating Beam Deflections and Slopes )it will be similar to the attached files. it's going to be in 30 hours. and i have an hour to submit the answer.
Cumberlands Advantages & Disadvantages of Digital Signatures Discussion
After reading chapter 13, analyze the advantages and disadvantages of digital signatures. You must use one scholarly refe ...
Cumberlands Advantages & Disadvantages of Digital Signatures Discussion
After reading chapter 13, analyze the advantages and disadvantages of digital signatures. You must use one scholarly reference here.
Southern New Hampshire University Security Breach Analysis
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be ...
Southern New Hampshire University Security Breach Analysis
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security (CIS) critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization towards compliance. They are not meant to be used in isolation. Comparing an organization’s technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders. Prompt After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below: I. Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders). A. Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use. II. Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified either by policy, implementation, automation, or reporting to enhance security for the organization. A. Subcontrol One: Describe the modification of the subcontrol and justify your recommendation. B. Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation. III. Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication. A. Discuss the merits of using RSA encryption and the implementation of two-factor authentication. B. Discuss how different forms of encryption may be used in VPN software.
Earn money selling
your Study Documents