Mechanics of Materials: Lab #1 Tension Test

In: Science

Submitted By burnsie44
Words 982
Pages 4
Tension Test

[pic]
(Fractured Copper Specimen)

By: Christl Burns

Mechanics of Materials Sec. 4

Lab Preformed on: 2/9/12

Introduction
The tensile test was preformed on the following commonly used materials; 836 Cold Rolled Steel, T351-2024 Aluminum, 110 Copper, Grey Cast Iron, and HDPE Plastic. The first objective was to examine the stress-strain curves in order to calculate and identify the significant mechanical properties of these materials. The curves are also used to give a better understanding of what these mechanical properties mean. The second objective was to compare the mechanical properties and physical appearance of these materials. In order to get the stress-strain curves, each specimen was placed in the tensile testing apparatus. The load frame slowly stretches the specimen until it breaks. The extensometer, was placed directly on the specimen and was hooked up to a computer program that collected all of the data, which was used to make the stress-strain curves.

Procedure
First a punch was used to mark off a two inch section on each specimen. This section was marked off so that it could be used as a reference in finding the elongation of the specimen.Then, using a caliper, the diameter of each was measured and recorded. Now the mechanist calipers were set up in increments of 0.05 inches starting at 2.05 inches. Next the specimen was loaded into the tensile testing apparatus, the extensometer was put onto the specimen, and the data-acquisition program was turned on. The extensometer had to be taken off the specimen once it has reached its proportional limit. Once it was taken off the mechanist calipers were used. As soon as the length in between the two marks on the specimen lined up with the caliper length the data for the live load was recorded. This was done until the material fractured. Next the two halves were removed from…...

Similar Documents

Torsion Test Lab Report

...Lab 1: Tension Test Andrew Thiher 2/17/2012 Introduction: In this lab, we tested the material properties of 836 cold rolled steel, T351-2024 aluminum, 110 copper, grey cast iron, and high-density polyethylene (HDPE) by subjecting each material to a tensile force until it fractured. Using data gathered, we graphed the stress-strain graph and determined specific properties for each material. These properties included whether the specimen was ductile or brittle, yield stress, and tensile strength. For equations used, see appendix 2. Experimental Apparatus: Each material was prepared for the experiment by marking the initial length as two inches by means of a gage punch and hammer. Additionally, calipers were used to measure the initial diameter. The sample was then screwed into the tensile testing machine and an extensometer was attached to measure elongation and collect data. The extensometer remained attached until the material reached its proportional limit, at this point it was removed, and the remaining data was collected using machinist scales prepared in .05 inch increments. Each time the gauge length reached the preset machinist scale increment, the live load from the computer was recorded. This process was repeated until the specimen fractured. Once the specimen fractured, the final gauge length and smallest diameter in the necking region were recorded. Calculations: [pic] |Property |Cold Steel |110...

Words: 1379 - Pages: 6

Mechanics and Materials Measurement and Error Lab

...EML3012C – Lab #1 Measurement, Instrumentation, Statistics and Error Group 1A Lab Performed: 9-5-2012 Report Submitted: 10-11-2012 Table of Contents: I. Motive…………………………………………………………….…………….iii II. Experimental…………………………………………………………………..iv III. Results/Discussion ………………….………………….…………..…….v-viii Part 1 Data…………………………………………..………………………….......v Part 1 Histogram……………………………………...……………………………vi Part 1 Calculations…………………………………...………………………….v-vi Part 2 Data summary……………………………………..…………………….…vii Part 2 Calculations……………………………………….………………………viii IV. Conclusion…………………………………………………………………….ix V. Appendix…………………….……………………………………………...x-xii I. Motive: The purpose of this lab is to analyze the error and deviation of manmade and manufactured objects. Measuring the marbles 100 times gives a population. The block’s dimensions (length, width, height) were measured 20 times each. This gives a sample for each dimension. From the population and samples, a histogram can be made of the data. Additionally, from these mean, mode, median, and standard deviation can be calculated. Lastly, the error and error propagation must be included because there is human and instrumental error. II. Experimental: This lab had two parts. For the first part, 100 glass spheres were measured. The A spheres were used. In the second part, the......

Words: 1468 - Pages: 6

Materials Test 1 Review

...Chapter 1 – Materials Engineering Concepts * 1.1 Economic Factors * Availability and cost of raw materials * Manufacturing costs * Transportation * Placing * Maintenance * 1.2 Mechanical Properties * Loading conditions * Static load – A sustained loading of the structure over a period of time * Dynamic load – A load that generates a shock or vibration in the structure (periodic – repeats itself with time, random- load pattern never repeats, or transient- impulse load applied over short interval) * Dead load- Static load, always applied (weight of the structure) * Live load- Dynamic loads, (people in a building or movable objects) * Stress-Strain Relations * Stress : σ=FA (psi, ksi, kPa, MPa, GPa) * Strain: ε=Change in LengthOriginal Length (%, in/in, mm/mm) * Elastic behavior * Elasticity- instantaneous response (deformation to load) and must return to its original shape when the load is removed. Stretches the bonds between atoms-doesn’t change arrangement of atoms * Young’s Modulus (Modulus of Elasticity)- Slope of the linear portion of the stress-strain curve E=σε * Poisson’s ratio- Ratio of the lateral strain to the axial strain (must be between 0.0(compressible material)-0.5(does not change volume when load applied)) Usually between 0.1 and 0.45 ν=-εlεa * Generalized Hooke’s Law *......

Words: 1916 - Pages: 8

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default......

Words: 489 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Lab 1

...Lab Report 1: Pipettes and Std Curve Ingrid Simons University of Texas at El Paso June 12, 2014 Introduction: Procedures that require very small volumes of DNA and reagents are performed with instruments such as, micropipettes and pipettes. These instruments are used when scientists need to accurately and precisely deliver small volumes of a liquid. Molecular biologists use very small volumes of liquid at times they are as small as 0.1 µL, in order to do these measurements the use micropipettes. The function of the micropipettes is to act as a plunger when the depressed by the thumb and by its release liquid is drawn into a disposable plastic tip. The liquid is released when the plunger is pressed again (The University of QueensLand). The tip is an important part of the micropipette, each tip is disposable and come in different sizes depending of the micropipette being used. There is three standard micropipettes, the P20 which measures 0.5-20μL, P200 that measures 20-200 μL, and P1000 that measures 100 μL to 1 mL. An important part of this laboratory was learning how to read the meniscus curve. A meniscus is a curve that is formed at the surface of a molecular substance, such as water, when it touches another material (USGS). Meniscus is caused by adhesion, a result of water’s high surface tension. The glass beaker attracts water molecules, and water molecules stay together, as a result many molecules gather to touch the glass. They will accumulate along......

Words: 886 - Pages: 4

Lab 1

...© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic, OpenVAS to scan the network, reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. 2. What is promiscuous mode? 3. How does Wireshark differ from NetWitness Investigator? 4. Why is it important to select the student interface in the Wireshark? 5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? 6. Name at least five different scans that may be performed with Zenmap...

Words: 258 - Pages: 2

Physics Lab on Mechanics

...Wind is very essential If the experiment is being done directly under an air vent the ball would go much faster as there is extra downward force affecting time . Wind should be consistent throughout all the experiment trials . If the ball is heavy than it would fall much faster than a lighter ball so all experiment trials should have the same mass and this would mean to have the same type of ball. Suppose the ball was made out of rubber , it would have much more air resistance and will slow the time of the ball. Independent Variables-Distance at which the height is dropped Dependent Variables- The time of how long it takes for the ball to drop from Point A to B Diagram Equipment • Stopwatch (±0.01s) • Ball(same mass and same type of ball) • 1 meter ruler (± 0.05cm) • 3 meter tape Method • • • • • First measure the distance ,Start with a height of 0.3m Accurately time the ball when released and time the ball when it hits the ground Then , Increase the height by 0.3m and repeat step 2 Take a minimum of three trials of each reading to improve accuracy Take an average of the readings and then using the formulae and the graph find the value of Gravity Calculation(Raw Data) Distance   0.3m 0.6m 0.9m 1.2m 1.5m 1.8m 2.1m 2.4m   Average   Time1(s)   Time2(s)   Time3(s)   Average   Acceleration +  0.01   +  0.01   +  0.01   Time(s)   m.s-­‐2     (2s/t2)   +  0.01   0.22 0.23 0.22 0.22 12.39 0.34 0.33 0.35 0.34 10.38 0.46 0.47 0.43 0.45 8.89......

Words: 1334 - Pages: 6

Grit Test- Lab 1

...Grit Test- Lab 1 On the scale of 1 to 5, my grit test score was a 2.57, I gave every answer my time and was full honest but for some reason it just doesn’t make much sense. This test of grit is supposed to measures conscientiousness courage, excellence, resilience, and endurance versus perfection. In the courage part when it talks about fear of failure is described as, “a debilitating disorder characterized by an unhealthy aversion to risk. Some symptoms include anxiety, mental blocks, and perfectionism…” Even though I don’t think I have a disorder I’m pretty conscious with the fact that I do have a fear of failure. In fact, when it comes to perfectionism, I end up spending more time on the final presentation and every little detail rather than focus on the excellence of a project. Age is a very important in determining level of grit in a population. Individual experience about when being persistent allows you to figure out which things are worth doing. It may be worth someone you may be paying for services or solution to a problem, but it may not be worth pursuing a modeling career at the age of 30 and being 60 pounds overweight. Learning to pick my fights is not a reflection of my grittiness, but somewhat realistic of the human condition, which is almost always disappointing. Most of the tips listed on ways to improve grit said I was “realistic optimist” (Jotski, K.). This worked for me a couple quarters back when I chose to be the leader for a debate. ...

Words: 312 - Pages: 2

Mechanic Lab Manual

...UNIVERSITI TUNKU ABDUL RAHMAN CENTRE FOR FOUNDATION STUDIES FOUNDATION IN SCIENCE (P) FHSC1014 MECHANICS LABORATORY MANUAL UTAR FHSC1014 Mechanics Trimester 1 UNIVERSITI TUNKU ABDUL RAHMAN CENTRE FOR FOUNDATION STUDIES LABORATORY SAFETY RULES The following rules must be obeyed by all students in the science laboratory of the faculty. Willful or repeated inadvertent noncompliance may result in dismissal or suspension from the laboratories. I. No entry without permission: i) ii) iii) Outsiders are not allowed to enter the laboratory without permission. Visitor must request for a lab coat from the laboratory officer before enter to the laboratory. No student is allowed to enter the laboratory unless permission has been given by laboratory officer or lecturer. II. At work in the laboratory: i) ii) iii) iv) v) vi) vii) viii) No experiment may be attempted without the knowledge and permission of lecturer or lab officer. Laboratory coat must be worn at all times in the laboratory. Students must wear covered shoes in the laboratory. Students wearing open toes shoes such as slippers or sandals are not allowed to work in the laboratory. Safety glasses must be worn when necessary. Mobile phones are to be switched off at all times in the laboratory. Do not smoke, drink, eat, bite nails or pencils, or apply cosmetics in the laboratory. Do not pipette chemicals with mouth. Do not taste any chemicals, including diluted solutions. If any acid or alkali accidentally enters...

Words: 6817 - Pages: 28

Lab 1

...Unit 1 Labs Lab 1.1 Step 13 Lab 1.2 Define Major Topics for a Database NOUNS | MAJOR TOPIC | Doctors | Patients | Drugs | Side Effects | Researchers | Patient Information | Westlake Research Hospital | Conducting test of new Depression Drugs | Lab 1.3 Create a Statement of Work Scope The Software-Tracking database will be used to help manage the school’s software licensing. The software will be monitored for lifecycle and version corrections as well as keeping track of the number of users accessing the software under the constraints of the license agreement. The faculty and staff computers will be tracked for which version and licensed copy of software is currently running on each system. Constraints The database can be used for accessing the faculty and staff’s logon to the school employee website for the purpose of inputting and updating hours worked. Faculty and staff members can conduct business related work, such as adjusting work schedules, and student’s grades in the system but are not able to view student’s personal files in the registrars system. Objectives * Make for a more efficient system by allowing employees to have control of shared calendars and student’s grades. * Improve the tracking of Software Licensing and the Lifecycle of programs. Tasks and Timeline 1. Gathering Data: Meet with School Board and those involved to discuss the needs and wants for a database. Time Allotted: 3 weeks. Deliverables: A list of......

Words: 365 - Pages: 2

Lab #1

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Wireshark , NetWitness Investigator ,OpenVAS ,PuTTY ,FileZilla . 2. What is promiscuous mode? Promiscuous mode allows Wireshark to capture any packets to any host on the same subnet or virtual LAN. if the promiscuous mode is not selected Wireshark will only capture the packets passing through the virtual LAN. 3. How does Wireshark differ from NetWitness Investigator? NetWitness analyze......

Words: 401 - Pages: 2

Lab 1

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. FileZilla, NetWitness Investigator, OpenVAS, PuTTY, and Wireshark. 2. What is promiscuous mode? This mode allows Wireshark to capture packets destine to any host on the subnet. 3. How does Wireshark differ from NetWitness Investigator? Wireshark looks at individual packets and is a up close detailed view. NetWitness Investigator give a overview of all the packets captured. 4. Why is......

Words: 365 - Pages: 2

Lab 1

...Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Introduction to Computer Security CSS150 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Putty, Wireshark, Zenmap, FileZilla, Tftpd64, OpenVAS, NetWitness Investigator 2. What is promiscuous mode? Promiscuous mode is a network interface mode in which the NIC (network interface card) reports every packet that it sees on the same subnet or VLAN. Does not assume that this mode means you will see all traffic on you network mode but for purposes......

Words: 531 - Pages: 3