Question

In a standard sieve analysis, which of the following sieve size
is the boundary between C**ourse Grain** and
**Fine Grain** Soil in the USCS Soil Classification
System?

No. 4 Sieve |
||

No. 200 Sieve |
||

No. 40 Sieve |
||

No. 16 Sieve |

Answer #1

Sieve Size
Percent Passing
1"
100
3/4"
92
1/2"
78
#4
62
#10
53
#20
46
#40
42
#100
37
#200
30
Liquid Limit
45
Plastic Limit
36
Classify the soil using the Unified Soil Classification System
(USCS). Provide both the description (i.e., Clayey
Gravel, sandy Silt, etc) and the two letter USCS classification
(i.e., GP, SP, CL, etc)

Determine the percent finer than each sieve size and plot the
grain size- distribution curve.
Determine the values of D60, D30, and D10 for the grain-size
distribution curve.
Calculate the uniformity coefficient Cu and the coefficient of
gradation Cg.
Comment on the degree of gradation (i.e., whether the soil is
well graded, poorly graded, or gap graded, etc.)
Sieve #
Mass of Soil Retained on each Sieve (gram)
4
0
10
27
20
58
40
112
60
136
80
144...

Questions 1 through 6 are based on a soil with the following
properties:
Liquid Limit
= 30.0%
Plastic Limit
= 12.0%
Sieve
Analysis:
Sieve Size
% Passing
3/8”
100%
No. 4
75.2%
No. 10
60.0%
No. 40
40.1%
No. 200
16.0%
1.
The fine-grained portion of the soil is:
a.
16.0%
b.
40.1%
c.
84.0%
d. 59.9%
2. %
retained on No. 4 sieve is:
a.
75.2%
b.
60.0%
c.
40.1%
d. 24.8%
3.
The...

1) A Standard Penetration Test (SPT was performed at a depth of
10 ft in sand of unit weight 125 lb/ft3. The N-value was
found to be 30. Determine the corrected N-value.
CN = 0.77 x log10 (20/po)
A. 32
B. 34
C. 37
D. 40
2) A standard penetration test was conducted in the field. The
boring logger recorded following three readings for 6 inch interval
of penetration: 1/2/3. What is N-value?
A. 3
B. 5
C. 2
D....

Which of the following is the alternative term given to
incremental analysis?
a. Common size analysis
b. Differential analysis
c. DuPont analysis
d. Trend analysis

single choice
( ) Which of the following cover design can be used
in the arid regime.
A. Capillary barrier cover consists of a fine-grained
soil layer over a coarse-grained soil layer.
B. Store and release cover with cobbles or gravels
cover
C. Final cover with surface protection soil layer
D. All of the above
( ) Select insrrect statement about the geosynthetic
clay liner (GCL) used in the liner
system of a landfill.
A. GCL aims to prevent the...

15. Random samples of size 81 are taken from an infinite
population whose mean and standard deviation are 200 and 18,
respectively. The distribution of the population is unknown. The
mean and the standard error of the mean are (assuming infinite
population)
a. 200 and 18
b. 81 and 18
c. 9 and 2
d. 200 and 2
16. A population has a mean of 300 and a standard deviation of
18. A sample of 144 observations will be taken....

The owner of a local golf course wants to estimate the
difference between the average ages of males and females that play
on the golf course. He randomly samples 30 men and 26 women that
play on his course. He finds the average age of the men to be
49.844 with a standard deviation of 5.208. The average age of the
women was 35.237 with a standard deviation of 5.573. He uses this
information to calculate a 95% confidence interval...

QUESTION 5
When using the sink/float method to determine the similarities
in densities between two objects
two immiscible liquids are chosen
two liquids with identical densities are chosen
the liquids chosen must contain bromine
the particles will settle at the same level
the particles will show buoyancy depending upon their size
10 points
QUESTION 6
A dispersion curve
allows for the determination of the density of a substance
shows the relationship between wavelength and refractive
index
is a means...

incident response course
Question 36
Which of the following is a general term for software that is
inherently hostile, intrusive, or annoying in its operation?
A.
Adware
B.
Malware
C.
Scareware
D.
Worm
Question 37
Worms require user intervention for their infection to take
place; viruses do not.
True
False
Question 38
An attacker can use a keystroke logger to monitor activity on a
system and have it reported back to the attacker.
True
False
Question 39
Dean believes that...

ADVERTISEMENT

Get Answers For Free

Most questions answered within 1 hours.

ADVERTISEMENT

asked 11 minutes ago

asked 14 minutes ago

asked 30 minutes ago

asked 39 minutes ago

asked 43 minutes ago

asked 43 minutes ago

asked 45 minutes ago

asked 48 minutes ago

asked 51 minutes ago

asked 53 minutes ago

asked 1 hour ago

asked 1 hour ago