• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
Page
1. 1
1
2. 2
2
3. 3
3
4. 4
4
5. 5
5

# Setting up Microsoft Excel spreadsheet to simulate projectile motion.

Extracts from this document...

Introduction

Access Physics

Simulating Projectile Motion Using Microsoft Excel

V.J. Clarke

Setting up Microsoft Excel spreadsheet to simulate projectile motion.

The study of the motion of a projectile, called ballistics can be simulated mathematically by use of a spreadsheet, i.e. Microsoft Excel.

To create a simulation, a few assumptions have to be made about the projectile, its launch device, and the forces acting on it in a perfect situation.

The mass of the projectile is irrelevant because the acceleration due to gravity is roughly the same wherever you are on Earth, and what ever the mass of the object.

I assumed that acceleration due to gravity was a constant 9.8 meters/s/s, that air resistance was negligible, and that the projectile itself was suitably streamlined to reduce drag.

Middle

i.e. the Muzzle Velocity multiplied by the Sine of the Muzzle’s Angle of Elevation.  Sine in trigonometric terms refers to the side opposite the known angle (θ).

The horizontal component Ux is calculated in a similar way, this time by using the formula:

Ux = U Cosineθ

i.e. the Muzzle Velocity multiplied by the Cosine of the angle (θ).

Using the vertical component, the formula  v = Uy + a t is re-arranged to find the value of t:

(v – Uy)/a = t

This re-arranged version of the formula is used to calculate the time in seconds before hitting terminal velocity, i.e. ceasing acceleration altogether in the vertical component, before the force of gravity pulls it back towards the ground.

Example:

(0 – 346.41) / -9.8 = 35.31

The value of gravity used here

Conclusion

=+H5*F5

The Maximum Height the missile reaches is calculated by the formula: s = (Uyt)-(9.8/2*t*t), this is entered in to J5 in the form:

=+(E5*G5)-(9.8*0.5*G5*G5)

(These formulas are repeated to their corresponding fields all the way down the column.)

Limit of Accuracy.

The degree of accuracy of the spreadsheet and the resulting graphs is limited by several factors.

The curve of the graph could have been smoother if the intervals had been set at less than 10°.

The computer is limited to using radians, rather than true degrees.

Formulas for converting Degrees into Radians.

SinΠ = 0

SinΠ /2 = 1

Degrees

Sin180° = 0

Sin 90° = 1

As acceleration due to gravity is rounded to one decimal place, the answers are only accurate to approx. 2 decimal places.

The Excel spreadsheet is not really accurate enough for scientific purposes, and is better for business applications.

This student written piece of work is one of many that can be found in our University Degree Software Engineering section.

## Found what you're looking for?

• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month

Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month

# Related University Degree Software Engineering essays

1. ## Programming Concepts. Andora Video is a small shop selling videos. The owner, Raul, wishes ...

VAT% (Expected) Expected Overall Total Observed Overall Total Result - ALL ABOVE 8 �128.96 12% (�15.47) 17.5% (�19.85) 133.34 �93.62 fail The overall total should be the overall price of the 8 DVDs minus the discount which would give us '113.4848', then add the VAT which equals 133.34.

2. ## MS Office solutions. Fantasy mobiles require: ...

Microsoft's SQL Server, Oracle) may be needed. It is also unsuitable for large dynamic websites due to performance issues. Sanger (2009) explains Microsoft Access is meant for individuals and small businesses. One of the reasons he gives for this is that the data within the database is limited to an overall 2GB size.

1. ## 3SFE504 - Object Oriented Programming - Linear and Independent Hash Table code

0-596-00761-2 STUDENT B- INDEPENDENT REHASHING TECHNIQUE CODING As a group, we created the Definition.cc and List.cc files together. Definition.h //Definition.h #ifndef Definition_h #define Definition_h #include <string> #include <cstdlib> using namespace std; class Definition { public: Definition(); //constructor (initialisation) ~Definition(); //setter methods void setDefinition(string def); void setNext(Definition*); //getter methods string getDefinition();

2. ## Rich Internet Applications

These technologies summarised give a small overview of some of the main technologies competing in the RIA market. They all base themselves mainly around the open standard JavaScript language. Unlike this, Adobe use their own scripting language and have a whole framework in which RIA's can be developed, They are

1. ## to help in the selection of tools that support the software quality management process.

Some methods involve both a subjective and an objective element. DESMET calls these hybrid methods (Kitchenham, Linkman, and Law 1996). In addition to the separation between quantitative, qualitative, and hybrid evaluations, there is another dimension to an evaluation: the way in which the evaluation is organized.

2. ## Creating a database system for Mr Azizur Rahman, Mr Bilal Sheikh and Mr Iman ...

Human Errors: When recording customer details/requirements the technicians try to note down what information they need from them, this is usually brief and unprofessional plus the writing in the recording sheet is usually not understandable, as the individual boxes are too small to record, thus human error occurs in gathering the information e.g.

1. ## Evaluating Websites Usability - comparing 5 websites.

When the ?Links? link is pressed links page comes up with all links on left hand side of screen. When the ?Emlit Project 2003? link is pressed error 404 is given and when link for www.greatworks.org is pressed a new tab is opened and no content is displayed only blank screen.

2. ## Abstract This report is dedicated to demonstrating and critically reviewing new features and developments ...

BitLocker and BitLocker To Go BitLocker is a new drive encryption technology introduced with the Vista operating system. With BitLocker enabled, all files on a personal computer?s hard disk drive are automatically encrypted helping to prevent information from being read by others if a computer is lost, stolen or sold.

• Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to