SlideShare a Scribd company logo
1 of 2
[object Object],Chapter 1 : Use of mathematics to find answer : R P F 60 o β δ
Chapter 1 : Use of mathematics to find answer : P = 280 N Given : F = 180 N Applying the Sine Rule c =  R a =  P b =  F 60 o β δ

More Related Content

What's hot

Interactive notes 5.1
Interactive notes 5.1Interactive notes 5.1
Interactive notes 5.1
venice156
 
Chapter 5 unit 9
Chapter 5 unit 9Chapter 5 unit 9
Chapter 5 unit 9
Ltbaker2
 
Proofs day 2 and test review
Proofs day 2 and test reviewProofs day 2 and test review
Proofs day 2 and test review
jbianco9910
 
Pc9 3 polar&rect
Pc9 3 polar&rectPc9 3 polar&rect
Pc9 3 polar&rect
vhiggins1
 

What's hot (20)

Interactive notes 5.1
Interactive notes 5.1Interactive notes 5.1
Interactive notes 5.1
 
Class 10 maths lesson 1 part 8
Class 10 maths lesson 1   part 8Class 10 maths lesson 1   part 8
Class 10 maths lesson 1 part 8
 
Math unit21 formulae
Math unit21 formulaeMath unit21 formulae
Math unit21 formulae
 
Quaternion notations
Quaternion notationsQuaternion notations
Quaternion notations
 
Resolucion de problema 27-5
Resolucion de problema 27-5Resolucion de problema 27-5
Resolucion de problema 27-5
 
Chapter 5 unit 9
Chapter 5 unit 9Chapter 5 unit 9
Chapter 5 unit 9
 
Rabin Karp Algorithm
Rabin Karp AlgorithmRabin Karp Algorithm
Rabin Karp Algorithm
 
Proofs day 2 and test review
Proofs day 2 and test reviewProofs day 2 and test review
Proofs day 2 and test review
 
4.7 inverse functions.ppt worked
4.7   inverse functions.ppt worked4.7   inverse functions.ppt worked
4.7 inverse functions.ppt worked
 
8.3 Vectors
8.3 Vectors8.3 Vectors
8.3 Vectors
 
7.6 notes
7.6 notes7.6 notes
7.6 notes
 
convex hull
convex hullconvex hull
convex hull
 
Convex hulls & Chan's algorithm
Convex hulls & Chan's algorithmConvex hulls & Chan's algorithm
Convex hulls & Chan's algorithm
 
Isotherm project
Isotherm projectIsotherm project
Isotherm project
 
Chapter 1(4)SCALAR AND VECTOR
Chapter 1(4)SCALAR AND VECTORChapter 1(4)SCALAR AND VECTOR
Chapter 1(4)SCALAR AND VECTOR
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Rabin Carp String Matching algorithm
Rabin Carp String Matching  algorithmRabin Carp String Matching  algorithm
Rabin Carp String Matching algorithm
 
Pc9 3 polar&rect
Pc9 3 polar&rectPc9 3 polar&rect
Pc9 3 polar&rect
 
Convex hull
Convex hullConvex hull
Convex hull
 
convex hull
convex hullconvex hull
convex hull
 

Viewers also liked (10)

Vectors 5 2 Part 2
Vectors 5 2 Part 2Vectors 5 2 Part 2
Vectors 5 2 Part 2
 
Physics chapter 3 and 5
Physics chapter 3 and 5Physics chapter 3 and 5
Physics chapter 3 and 5
 
Getting vector resultant using polygon method
Getting vector resultant using polygon methodGetting vector resultant using polygon method
Getting vector resultant using polygon method
 
Sue
SueSue
Sue
 
Chapter 2: Forces and Motion
Chapter 2: Forces and Motion  Chapter 2: Forces and Motion
Chapter 2: Forces and Motion
 
Exercises Chapter 2:Force & Motion
Exercises Chapter 2:Force & MotionExercises Chapter 2:Force & Motion
Exercises Chapter 2:Force & Motion
 
Physics Pp Presentation Ch 4
Physics Pp Presentation Ch 4Physics Pp Presentation Ch 4
Physics Pp Presentation Ch 4
 
Physics Chapter 5 Pp Presentation
Physics Chapter 5 Pp PresentationPhysics Chapter 5 Pp Presentation
Physics Chapter 5 Pp Presentation
 
Academic Physics - Chapter 5 Powerpoint
Academic Physics - Chapter 5 PowerpointAcademic Physics - Chapter 5 Powerpoint
Academic Physics - Chapter 5 Powerpoint
 
Concurrent Forces
Concurrent ForcesConcurrent Forces
Concurrent Forces
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

Chapter1 Qn

  • 1.
  • 2. Chapter 1 : Use of mathematics to find answer : P = 280 N Given : F = 180 N Applying the Sine Rule c = R a = P b = F 60 o β δ