
Essentials Of Materials Science And Engineering
4th Edition
ISBN: 9781337385497
Author: WRIGHT, Wendelin J.
Publisher: Cengage,
expand_more
expand_more
format_list_bulleted
Question
Chapter 13, Problem 13.1P
Interpretation Introduction
Interpretation:
The difference between cast iron and steel needs to be explained.
Concept Introduction:
Cast iron is an iron-carbon alloy containing carbon more than 2 percent. It has a comparatively small melting temperature which makes it helpful in making equipment. Steel is also an iron alloy but with less percentage of carbon. It can also have other elements alloyed with iron. It is a major component required in making buildings, machines and weapons etc. due to its high tensile strength and low cost.
Expert Solution & Answer

Answer to Problem 13.1P
The principal distinction between forged irons is that the iron is made of waste materials and iron, recognized as the 4% coal iron.
Explanation of Solution
Steel | Cast iron |
1) It contains less than 2% carbon content. | 1) It contains carbon content between 4% to 7%. |
2) Steel is milder and harder to cost. | 2) Cast iron is brittle and easier to cast. |
3) Tensile strength is more. | 3) Compressive strength is more. |
4) Cost is varying depending on grade and type. | 4) Cheaper than steel. |
5) Fabricated to make the structure, tools, etc. | 5) Manufacturing of manhole covers, piping, and guttering. |
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Information Security Risk and Vulnerability Assessment
1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset?
Please do not use AI and add refrence
Design a modulo-11 ripple (asynchronous) up-counter with negative edge-triggered T flip-flops and draw the corresponding logic circuit.
(I)Build the state diagram and extract the state table
(II)Draw the logic circuit
(III)What is the maximum modulus of the counter?
Information Security Risk and Vulnerability Assessment
1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset?
Please do not use AI and add refrence
Chapter 13 Solutions
Essentials Of Materials Science And Engineering
Ch. 13 - Prob. 13.1PCh. 13 - Prob. 13.2PCh. 13 - Prob. 13.3PCh. 13 - Prob. 13.4PCh. 13 - Prob. 13.5PCh. 13 - Prob. 13.6PCh. 13 - Prob. 13.7PCh. 13 - Prob. 13.8PCh. 13 - Prob. 13.9PCh. 13 - Prob. 13.10P
Ch. 13 - Prob. 13.11PCh. 13 - Prob. 13.12PCh. 13 - Prob. 13.13PCh. 13 - Prob. 13.14PCh. 13 - Prob. 13.15PCh. 13 - Prob. 13.16PCh. 13 - Prob. 13.17PCh. 13 - Prob. 13.18PCh. 13 - Prob. 13.19PCh. 13 - Prob. 13.20PCh. 13 - Prob. 13.21PCh. 13 - Prob. 13.22PCh. 13 - Prob. 13.23PCh. 13 - Prob. 13.24PCh. 13 - Prob. 13.25PCh. 13 - Prob. 13.26PCh. 13 - Prob. 13.27PCh. 13 - Prob. 13.28PCh. 13 - Prob. 13.29PCh. 13 - Prob. 13.30PCh. 13 - Prob. 13.31PCh. 13 - Prob. 13.32PCh. 13 - Prob. 13.33PCh. 13 - Prob. 13.34PCh. 13 - Prob. 13.35PCh. 13 - Prob. 13.36PCh. 13 - Prob. 13.37PCh. 13 - Prob. 13.38PCh. 13 - Prob. 13.39PCh. 13 - Prob. 13.40PCh. 13 - Prob. 13.41PCh. 13 - Prob. 13.42PCh. 13 - Prob. 13.43PCh. 13 - Prob. 13.44PCh. 13 - Prob. 13.45PCh. 13 - Prob. 13.46PCh. 13 - Prob. 13.47PCh. 13 - Prob. 13.48PCh. 13 - Prob. 13.49PCh. 13 - Prob. 13.50PCh. 13 - Prob. 13.51PCh. 13 - Prob. 13.52PCh. 13 - Prob. 13.53PCh. 13 - Prob. 13.54PCh. 13 - Prob. 13.55PCh. 13 - Prob. 13.56PCh. 13 - Prob. 13.57PCh. 13 - Prob. 13.58PCh. 13 - Prob. 13.59DPCh. 13 - Prob. 13.60DPCh. 13 - Prob. 13.61DPCh. 13 - Prob. 13.62DPCh. 13 - Prob. 13.63DPCh. 13 - Prob. 13.64DPCh. 13 - Prob. 13.65CPCh. 13 - Prob. K13.1KP
Knowledge Booster
Similar questions
- 1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software? 4- Who ensures the entity implements appropriate security controls to protect an asset? please do not use AI of any kind. please refrencearrow_forwardthe diagram show 4 motor connected to a k-35 controller. I would like detail explanation to know how the circuit work. Is the controller compatible with the motor? The motor shown is series, parallel or both?arrow_forwardplease draw logic diagram pleasearrow_forward
- Please draw the diagrams please thank youarrow_forwardmatlabarrow_forwardUsing Keras3 Create a Neural Network model with at least two hidden layers. Also, Add a drop out layer after each hidden layer to regularize the neural network model. Use tfruns package to tune your hyper-parameters including the drop out factors. Display the table returned by trfuns.arrow_forward
- Assume a car park facility where the arrival rate is λ customer every minute, and the service process including pressing the button, taking the card, and waiting for the boom to rise leads to service rate of μ customer every minute. a. Assume the arrival and service processes are stochastic. Using any software (Excel, Matlab, or the one you prefer), plot average delay time (including service time) and average queue size (including the vehicle currently being served) for all combinations of λ = {1,2,3,..,10} and p = {0.1,0.3,0.5,0.7,0.9}. Specifically, we ask you to make 2 graphs (one for average delay and the other for average queue size), where the x-axes contains the different values for 1, and where you make one curve for each p. b. Assume the arrival process is stochastic but the service process is deterministic with rate µ. Using any software (Excel, Matlab, or the one you prefer), plot average delay time (including service time) and average queue size (including the vehicle…arrow_forwardA plane wave propagating through a medium with &,,-8 μr = 2 has: E = 0.5 e-j0.33z sin (108 t - ẞz) ax V/m. Determine (a) ẞ (b) The loss tangent (c) Wave impedance (d) Wave velocity (e) H fieldarrow_forwardConsider, M people (aka pax) who want to travel by car from O to D. They all start working at D at Q (e.g., Q-8am). If a person departs at time t, assume the time needed to go from O to D is given by c(t)=A+Bx(t), where x(t) is the flow of people departing at time t [car/unit of time]. In addition, a is the penalty for being early at work (E(t) is how early the person arrived when departing at time t), and ẞ is the penalty for being late at work (L(t) is how late the person arrived when departing at time t). Assume 0 < a < 1 < ß. Further assume the departure time choice problem under the equilibrium conditions. Prove that the arrival time of people who depart when most of the M people start their trips is equal to Q.arrow_forward
- Find the voltage V0 across the 4K resistor using the mesh method or nodal analysis. Note: I have already simulated it and the value it should give is -1.714Varrow_forwardI want to explain my work in Python botnets and it is completely working on the tkinter function with an explanation of how I can work on it with an introduction about what it is and what its benefit isarrow_forward2) The phase voltage at the terminals of a balanced three-phase Y-connected load is 2400 V. The load has an impedance of 16+j12 2/6 and is fed from a line having an impedance of 0.10+j0.80 2/6. The Y- connected source at the sending end of the line has a positive phase sequence and an internal impedance of 0.02+j0.16 2/6. Use the a-phase voltage at the load as the reference. a) Construct the a-phase equivalent circuit of the system b) Calculate the line currents IaA, IbB, and Icc c) Calculate the phase voltages at the terminals of the source, Van, Vbn, Vcn- d) Calculate the line voltages at the source, Vab, Vbc and Vca. e) Calculate the internal phase-to-neutral voltages at the source, Va'n, Vb'n, Ve'n,arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- MATLAB: An Introduction with ApplicationsEngineeringISBN:9781119256830Author:Amos GilatPublisher:John Wiley & Sons IncEssentials Of Materials Science And EngineeringEngineeringISBN:9781337385497Author:WRIGHT, Wendelin J.Publisher:Cengage,Industrial Motor ControlEngineeringISBN:9781133691808Author:Stephen HermanPublisher:Cengage Learning
- Basics Of Engineering EconomyEngineeringISBN:9780073376356Author:Leland Blank, Anthony TarquinPublisher:MCGRAW-HILL HIGHER EDUCATIONStructural Steel Design (6th Edition)EngineeringISBN:9780134589657Author:Jack C. McCormac, Stephen F. CsernakPublisher:PEARSONFundamentals of Materials Science and Engineering...EngineeringISBN:9781119175483Author:William D. Callister Jr., David G. RethwischPublisher:WILEY

MATLAB: An Introduction with Applications
Engineering
ISBN:9781119256830
Author:Amos Gilat
Publisher:John Wiley & Sons Inc

Essentials Of Materials Science And Engineering
Engineering
ISBN:9781337385497
Author:WRIGHT, Wendelin J.
Publisher:Cengage,

Industrial Motor Control
Engineering
ISBN:9781133691808
Author:Stephen Herman
Publisher:Cengage Learning

Basics Of Engineering Economy
Engineering
ISBN:9780073376356
Author:Leland Blank, Anthony Tarquin
Publisher:MCGRAW-HILL HIGHER EDUCATION

Structural Steel Design (6th Edition)
Engineering
ISBN:9780134589657
Author:Jack C. McCormac, Stephen F. Csernak
Publisher:PEARSON

Fundamentals of Materials Science and Engineering...
Engineering
ISBN:9781119175483
Author:William D. Callister Jr., David G. Rethwisch
Publisher:WILEY