Question

In: Physics

A trebuchet was a hurling machine built to attack the walls of a castle under siege....

A trebuchet was a hurling machine built to attack the walls of a castle under siege. A large stone could be hurled against a wall to break apart the wall. The machine was not placed near the wall because then arrows could reach it from the castle wall. Instead, it was positioned so that the stone hit the wall during the second half of its flight. Suppose a stone is launched with a speed of v0 = 25.0 m/s and at an angle of θ0 = 41.0°. What is the speed of the stone if it hits the wall (a) just as it reaches the top of its parabolic path and (b) when it has descended to half that height? (c) As a percentage, how much faster is it moving in part (b) than in part (a)?

Solutions

Expert Solution

given Vo = 25 m/s

take g = 9.81 m/s^2 ( acceleration due to gravity )

Take apart the horizontal and vertical components of the velocity

the horizontal component will be constant because there is no air resistance and no horizontal forces acting on it

but the vertical component changes due to gravity acting downwards

so now

Vox = Vo * cos

= (25) * cos ( )

= 25 * 0.7547

= 18.86773 m/s

Voy = Vo * sin

= 25 * sin ()

= 25 * 0.656059

= 16.4014 m/s

a) At the top of its trajectory, its vertical component is momentarily zero, leaving only the horizontal component that you just figured. So that will be the velocity at the top of its trajectory.

Va = Vox = 18.86773 m/s

b) its given half that height

so find that half

H = Voy^2 / 2g

= (16.4014)^2 / 2*9.81

=13.7108 m

Half that height is H/2 = 6.8554 m

so we have the formula for distance as

here initial velocity is u = Voy and a= g ( as g will be acting downwards)

When you throw a ball in the air the velocity will be same at each point of when it is ascending and descending.

so lets take distance travelled s = H/2 we are talking in terms of vertical only

as we have already established that horizontal component wont be bothering the flight

so substituting these and finding the time required to go H/2

H/2 = Voy * t + (1/2 *(-g) * t^2)

6.8554 = 16.4014 * t - 0.5 * 9.81 *(t^2)

4.905 (t^2) -16.4041 * t + 6.8554 = 0

by solving this quadratic equation we find t = 2.854 s (only this root satisfies the equation)

now find the vertical velocity at t = 2.854 s by using , here a = - g as it is in the opposite direction of the velocity

Vy = Voy - gt

= 16.4014 - (9.81 * 2.854)

= -111.596 m/s

this is in the upward direction while descending it will be in the downward direction so it will be

+11.596 m/s

so now total velocity will be

Vb =

Vx = Vox = 18.86773 m/s and Vy = 11.596 m/s

Vb = = 22.146 m/s

c)

Now calculate the percentage

(Vb/Va) * 100 = (22.146/18.86773) * 100 = 117.37%

The Stone is moving 17.37 % faster in part b than in part a


Related Solutions

COURSE: SOIL MECHANICS -Types of Retaining Walls 1. Gravitational Walls 2. Cantilever Walls 3. Criva Walls...
COURSE: SOIL MECHANICS -Types of Retaining Walls 1. Gravitational Walls 2. Cantilever Walls 3. Criva Walls 4. Gabion Wall 5. Sheet pile walls 6. Screen walls 7. Armed Earth 8. Walls in Mensula 9. Buttress Walls -Describe the identified retaining walls -Identify the importance and application it represents.
You work at a company that is currently under a Distributed Denial of Services attack, performed...
You work at a company that is currently under a Distributed Denial of Services attack, performed by a very large botnet. You discover the vulnerability that would allow all of the bots attacking you to become compromised. You can use this vulnerability to clean these botnets or get them to stop listening to commands to attack you. Would you perform these actions? Is one more palatable to you than the other? What code of ethics are you basing this decision...
(Birthday attack) A birthday attack is a type of cryptographic attack that exploits the mathematics behind...
(Birthday attack) A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. It can be used to find collisions in a cryptographic hash function. Suppose that we have a hash function which, when supplied with a random input, returns one of 256 equally likely values. The attack generates n random inputs, supplies them into the hash function, and obtains n returned values (each is chosen from the 256 possible values...
Castle Consulting Agency began business in February. The transactions entered into by Castle during its first...
Castle Consulting Agency began business in February. The transactions entered into by Castle during its first month of operations are as follows: a. Acquired articles of incorporation from the state and issued 20,000 shares of capital stock in exchange for $300,000 in cash. b. Paid monthly rent of $700. c. Signed a five-year promissory note for $100,000 at the bank. d. Purchased software to be used on future jobs. The software costs $850 and is expected to be used on...
Consider the following proposal to prevent DES from exhaustive key search under a known-plaintext attack. The...
Consider the following proposal to prevent DES from exhaustive key search under a known-plaintext attack. The secret key is k=k{1,k2}, where k1 is in (0,1) ^56 and k2 is (0,1) ^64. Let m be in (0,1) ^64 be the plaintext message. Encryption is defined as follows Ek(m)=DESk1(m) XOR k2 (a) Show that this proposal does not increase the work needed to break the encryption scheme E using brute force (exhaustive) search (that is, approximately 2^56 DES operations are still sufficient)....
Explain the mathematical proof that One time pad (OTP) is perfectly secure under Ciphertext Only attack...
Explain the mathematical proof that One time pad (OTP) is perfectly secure under Ciphertext Only attack (COH).
The probability that a patient with a heart attack dies of the attack is 4%. Suppose...
The probability that a patient with a heart attack dies of the attack is 4%. Suppose we have 4 patients who suffer a heart attack a) what is the probability that 2 will survive? b) what is the probability that all will die? c) what is the probability that less than 3 will survive? d) what is the probability that all will survive?
Explain the differences between a replay attack and a Man-in-the-middle attack.
Explain the differences between a replay attack and a Man-in-the-middle attack.
Describe how the Heartbleed attack happens. What is the type of this attack? Where does the...
Describe how the Heartbleed attack happens. What is the type of this attack? Where does the vulnerability exist? Describe the vulnerability and how it is exploited? Describe the consequences of the attack?
Which Depreciation Method Should We Use? Atwater Manufacturing Company purchased a new machine especially built to...
Which Depreciation Method Should We Use? Atwater Manufacturing Company purchased a new machine especially built to perform one particular function on the assembly line. A difference of opinion has arisen as to the method of depreciation to be used in connection with this machine. Three methods are now being considered: (a)The straight-line method (b)The productive-output method (c)The sum-of-the-years’-digits method List separately the arguments for and against each of the proposed methods from both the theoretical and practical viewpoints.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT