A 6.0-m diameter cylindrical tank contains a hazardous material dissolved in mostly water. A leak occurred...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
A 6.0-m diameter cylindrical tank contains a hazardous material dissolved in mostly water. A leak occurred in the tank because a 0.1 m diameter pipe located 1.0 m above the bottom of the tank was accidentally disconnected. A 30-minute emergency response time is required to stop the leak. If the tank is vented to the atmosphere, calculate the following a) If total emptying time is 2.5 hours what is the original liquid level in the tank just prior to the spill. b) What is the liquid level in the tank at the end of the spill? c) Estimate the total amount of liquid spilled from the tank in m³ (V) and in kg (m)... (Assuming Co=0.61 for the highly turbulent flow; Assuming p = pwater = 1000 kg/m³) | P²₂² = 0 hL m P = Ambient Pressure A 6.0-m diameter cylindrical tank contains a hazardous material dissolved in mostly water. A leak occurred in the tank because a 0.1 m diameter pipe located 1.0 m above the bottom of the tank was accidentally disconnected. A 30-minute emergency response time is required to stop the leak. If the tank is vented to the atmosphere, calculate the following a) If total emptying time is 2.5 hours what is the original liquid level in the tank just prior to the spill. b) What is the liquid level in the tank at the end of the spill? c) Estimate the total amount of liquid spilled from the tank in m³ (V) and in kg (m)... (Assuming Co=0.61 for the highly turbulent flow; Assuming p = pwater = 1000 kg/m³) | P²₂² = 0 hL m P = Ambient Pressure
Expert Answer:
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these chemical engineering questions
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-5. Ivan's grandfather died and left a portfolio of municipal bonds. In 2012, they pay Ivan...
-
Suppose XYZ Corp. is an IT service providing company. Employee details of the company are stored in the following table: Table name: Employees_ where empID is your employee id (for example Employees...
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-6. On December 12, Irene purchased the building where her store is located. She paid...
-
Lets assume the client in the fact pattern in this weeks discussion board did not want to purchase the mothers house (in other words, forget about only those facts) and now has been appointed as the...
-
Calculate the energy of the antineutrino when 9038Sr decays via decay if the b particle has a kinetic energy of 435 keV.
-
Kirsten Hurst Program Plan One: Weeks One to Six Monday Tuesday Wednesday Thursday Friday Saturday Sunday Session type: Duration: Location: Training technique Intensity Sets and reps ( resistance...
-
Figure 1-2 shows that developments in IT affect both an organizations strategy and the design of its AIS. How can a company determine whether it is spending too much, too little, or just enough on...
-
Dee Beach, the consultant introduced at the beginning of section three of the chapter (p. 493), has obtained the following data relative to the Barnes & Riley consulting job: Assume that the La Mesa...
-
Taylor Bank lends Guarantee Company $ 1 0 7 , 0 0 0 on January 1 . Guarantee Company signs a $ 1 0 7 , 0 0 0 , 7 % , 9 - month, interest - bearing note. The entry made by Guarantee Company on January...
-
One subunit of Racer Sports Company had the following financial results last month: Requirements 1. Complete the performance evaluation report for this subunit (round to two decimal places). 2. Based...
-
An emergency turbine is driven by CO2 from high pressure tanks at 20 C and 10 atm. The manufacturer claims that a mass flow rate of 0.3 kg/s will produce 15 hp when exiting at 2 atm. Is his claim...
-
There are two renowned costing system i.e., Job Order Costing System or Process Costing System used by manufacturing or service organization. You are required to highlight the suitability, advantages...
-
1. Know the characteristics of different stages of the organizational life cycle and the different crises that organizations face through their life cycle. 2. What is the difference between...
-
A standing wave is produced in a vibrating string in its third harmonic as shown in the figure. If the length of the string is 1.5m and the frequency of the vibrating motor is 60Hz. Find out the...
-
Explain examples of successful application of data mining in business. Explain through examples the relationships between data mining and business intelligence. In each case, you must include the...
-
Below are examples of a few commonly used food labels in the hospitality industry. Please explain what the terms below mean (30 to 50 words). a. Best before: b. Use by: c. Use first: d. What is...
-
Looking for two responses that are good discussions for two points below. 1) GDP or Gross Domestic Product is a tool used to measure and assess all of the recorded economic activities within the US...
-
The column shown in the figure is fixed at the base and free at the upper end. A compressive load P acts at the top of the column with an eccentricity e from the axis of the column. Beginning with...
-
Deborah purchases a new $30,000 car in 2012 to use exclusively in her business. If Deborah does not elect to expense or take bonus depreciation in 2012 and holds the car until it is fully...
-
Jan has two jobs during 2012. One employer withheld and paid FICA taxes on $66,600 of Jan's salary, and the other employer withheld and paid FICA taxes on $44,400 in salary paid to Jan. Calculate the...
-
Karim Depak received a Form 1099-B showing the following stock transactions and basis during 2012: None of the stock is qualified small business stock. Calculate Karim's net capital gain or loss...
-
Which of the following techniques involves the creation and use of a pair of public and private keys? a. hashing c. symmetric encryption b. asymmetric encryption d. key escrow
-
Which of the following is a preventive control? a. penetration testing c. training b. patch management d. log analysis
-
The approach to perimeter defense that involves examining only information in the packet header of each individual IP packet is referred to as a. deep packet inspection c. stateful packet filtering...
Study smarter with the SolutionInn App