Reference no: EM131046372
Question 1.
Convert the following reduced bearings to whole circle bearings:
N.36°16'E; (b) S.28° 14' E. (c) S.47°26'W and (d) N.58°24'W
Question 2.
Convert the following reduced bearings to whole circle bearings:
N.36°16'E; (b) S.28° 14' E. (c) S.47°26'W and (d) N.58°24'W
Question 3.
A road at a constant RL of 180.00 runs North to South. The ground East to West is level. The surface levels along the centre line of the road are as follows:
Chainage in meter:
0 30 60 90 120 150 180
Level in meter:
183.50 182.45 182.15 181.55 180.95 182.05 180.80
Compute the volume of cutting, given that the width at formation level is 8 m and the side slopes 1 1/2 to 1. The centre depths of the cutting at 30 m intervals may be determined by subtracting the formation from the respective ground levels.
Question 4.
In the left column of the table below, listed are a range of geological studies that can be performed through various investigation mechanisms. Based on your research and independent studies, analyse which of these studies can be performed through seismic methods and fill out the right hand side of the column, with appropriate answer, options are: Yes / No / Possible.
Applications
|
Can Seismic Methods be Used for this Application?
(Yes/ No/ Possible)
|
|
|
1. Assessing the Depth of soil and rock
|
|
2. Mapping lateral anomaly locations
|
|
3. Determining vertical anomaly depths
|
|
4. Very high resolution of lateral or vertical anomalous conditions
|
|
5. Depth to water table
|
|
|
|
6. Existence of contaminant
|
|
7. Mapping contaminant boundaries
|
|
8. Determining vertical extent of contaminant
|
|
9. Determine flow direction
|
|
10. Detection of organics floating on water table
|
|
|
|
11. Location of Bulk wastes
|
|
12. Location of Non-metallic containers
|
|
13. Location of Metallic containers
|
|
14. Depth of a Buried Object
|
|
|
|
15. Location of utility pipes, cables and etc.
|
|
16. Identification of permeable pathways associated with loose fill in utility trenches
|
|
Question 5
Your task is to provide the following for another commonly used methodology known as the Core Cutter Method.
a) Provide the detailed procedure for undertaking the Core Cutter Method.
b) Provide a detailed Core Cutter Method Results Data Table to tabulate your information.
c) Complete the Core Cutter Method Results Data Table based on the information provided in this question and on representative/realistic information that you obtain from your research on this method.
Given Data
You will be using the following apparatus to conduct the test:
- Cylindrical core cutter, 100mm internal diameter and 130mm long.
- Steel rammer, mass 9kg, overall length with the foot and staff about 900mm.
- Steel dolley, 25mm high and 100mm internal diameter.
- Weighing balance, accuracy 1g.
- Palette knife.
- Straight edge and steel ruler.
No of Pages/Words : 2
Could any channel requirements be relaxed
: What would have to improve? By approximately how much? Could any channel requirements be relaxed?
|
Greatest conceivable ability irregularity
: He looks to isolate the players as unreasonably as could be expected under the circumstances, in order to make the greatest conceivable ability irregularity between group An and group B. Indicate how the Grinch can carry out the employment in O(nl..
|
To the ratio of packet size to packet header size
: How accurate do you think this model of the relative merits of circuits and packets is? Does it ignore important considerations that discredit one or the other approach? If so, what are they?
|
Select the sentence that is punctuated correctly
: Select the sentence that is punctuated correctly. "You mustn't allow your frustration to interfere with your motivation," advised the Admissions Counselor. "Tech support is available 24/7 to help with these issues", she then explained.
|
Provide procedure for undertaking the core cutter method
: Compute the volume of cutting, given that the width at formation level is 8 m and the side slopes 1 1/2 to 1 - Provide the detailed procedure for undertaking the Core Cutter Method.
|
Command and natural language
: The president of your company approached you with his iPhone in one hand and his iPad in the other. He has just purchased the iPhone 4S and is fascinated with Siri, the voice recognition software. He then pulls up an app your team developed fo..
|
Which size is optimal
: Suppose that a certain communications protocol involves a per-packet overhead of 100 bytes for headers and framing
|
Calculate the bandwidth at which each compression option
: Calculate the bandwidth at which each compression option takes the same total compression + transmission time.
|
Display the attributes of a file
: discuss whether they are more likely to be delay sensitive or bandwidth sensitive.
|