• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Setting up Microsoft Excel spreadsheet to simulate projectile motion.

Extracts from this document...

Introduction

Access Physics

Simulating Projectile Motion Using Microsoft Excel

V.J. Clarke


Setting up Microsoft Excel spreadsheet to simulate projectile motion.

The study of the motion of a projectile, called ballistics can be simulated mathematically by use of a spreadsheet, i.e. Microsoft Excel.

To create a simulation, a few assumptions have to be made about the projectile, its launch device, and the forces acting on it in a perfect situation.

The mass of the projectile is irrelevant because the acceleration due to gravity is roughly the same wherever you are on Earth, and what ever the mass of the object.

I assumed that acceleration due to gravity was a constant 9.8 meters/s/s, that air resistance was negligible, and that the projectile itself was suitably streamlined to reduce drag.

...read more.

Middle

i.e. the Muzzle Velocity multiplied by the Sine of the Muzzle’s Angle of Elevation.  Sine in trigonometric terms refers to the side opposite the known angle (θ).

The horizontal component Ux is calculated in a similar way, this time by using the formula:

Ux = U Cosineθ

i.e. the Muzzle Velocity multiplied by the Cosine of the angle (θ).

Using the vertical component, the formula  v = Uy + a t is re-arranged to find the value of t:

(v – Uy)/a = t

This re-arranged version of the formula is used to calculate the time in seconds before hitting terminal velocity, i.e. ceasing acceleration altogether in the vertical component, before the force of gravity pulls it back towards the ground.

Example:

(0 – 346.41) / -9.8 = 35.31

The value of gravity used here

...read more.

Conclusion

=+H5*F5

The Maximum Height the missile reaches is calculated by the formula: s = (Uyt)-(9.8/2*t*t), this is entered in to J5 in the form:

=+(E5*G5)-(9.8*0.5*G5*G5)

(These formulas are repeated to their corresponding fields all the way down the column.)

Limit of Accuracy.

The degree of accuracy of the spreadsheet and the resulting graphs is limited by several factors.

The curve of the graph could have been smoother if the intervals had been set at less than 10°.

The computer is limited to using radians, rather than true degrees.

Formulas for converting Degrees into Radians.

Radians        

SinΠ = 0

SinΠ /2 = 1

Degrees

Sin180° = 0

Sin 90° = 1

2Π Radians = 360°

360/2Π = 57.29 Radians

As acceleration due to gravity is rounded to one decimal place, the answers are only accurate to approx. 2 decimal places.

The Excel spreadsheet is not really accurate enough for scientific purposes, and is better for business applications.

...read more.

This student written piece of work is one of many that can be found in our University Degree Software Engineering section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Software Engineering essays

  1. Programming Concepts. Andora Video is a small shop selling videos. The owner, Raul, wishes ...

    VAT% (Expected) Expected Overall Total Observed Overall Total Result - ALL ABOVE 8 �128.96 12% (�15.47) 17.5% (�19.85) 133.34 �93.62 fail The overall total should be the overall price of the 8 DVDs minus the discount which would give us '113.4848', then add the VAT which equals 133.34.

  2. MS Office solutions. Fantasy mobiles require: ...

    Microsoft's SQL Server, Oracle) may be needed. It is also unsuitable for large dynamic websites due to performance issues. Sanger (2009) explains Microsoft Access is meant for individuals and small businesses. One of the reasons he gives for this is that the data within the database is limited to an overall 2GB size.

  1. 3SFE504 - Object Oriented Programming - Linear and Independent Hash Table code

    0-596-00761-2 STUDENT B- INDEPENDENT REHASHING TECHNIQUE CODING As a group, we created the Definition.cc and List.cc files together. Definition.h //Definition.h #ifndef Definition_h #define Definition_h #include <string> #include <cstdlib> using namespace std; class Definition { public: Definition(); //constructor (initialisation) ~Definition(); //setter methods void setDefinition(string def); void setNext(Definition*); //getter methods string getDefinition();

  2. Rich Internet Applications

    These technologies summarised give a small overview of some of the main technologies competing in the RIA market. They all base themselves mainly around the open standard JavaScript language. Unlike this, Adobe use their own scripting language and have a whole framework in which RIA's can be developed, They are

  1. Creating a database system for Mr Azizur Rahman, Mr Bilal Sheikh and Mr Iman ...

    This results in a delay in the ordering of the new components and in effect delays the up grade of the computer. In addition the calculations made to work out the overall cost of the upgrade and to see whether or not it meets the price limit set by the customer.

  2. Human Computer Interaction Project.

    In a world that is becoming increasing technology based, is the digital camera the next logical step in art of photography? "Olympus is renowned for high image quality on all its digital cameras. Advanced technology and the fundamental expert know-how brought over from analog photography put Olympus digital cameras into world-leaders-position in image quality [1]".

  1. Evaluating Websites Usability - comparing 5 websites.

    When the ?Links? link is pressed links page comes up with all links on left hand side of screen. When the ?Emlit Project 2003? link is pressed error 404 is given and when link for www.greatworks.org is pressed a new tab is opened and no content is displayed only blank screen.

  2. Abstract This report is dedicated to demonstrating and critically reviewing new features and developments ...

    BitLocker and BitLocker To Go BitLocker is a new drive encryption technology introduced with the Vista operating system. With BitLocker enabled, all files on a personal computer?s hard disk drive are automatically encrypted helping to prevent information from being read by others if a computer is lost, stolen or sold.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work