How do you securely, and properly reinforce damaged roof trusses?

1 Answer

Answer :

to replace trusses you need to first place alternate load-bearing measures. Run a support header beneath the ridge of your roof, to the length of your roof. Construct support walls or beams. Reinforce the roof rafters. Remove the damaged trusses after the new support system is placed and last but not least place the new trusses.

Related questions

Description : If you bought roof trusses do you need delivery?

Last Answer : It is dependent on where you live, but roof trusses are available to purchase and be delivered to your house. Or you could pick up the trusses yourself if you prefer those means.

Description : The knuckle joint is used two joint between the tie bars in roof trusses. A. True B. False

Last Answer : A. True

Description : The purlins in roof trusses are placed at the panel points essentially to avoid (a) Axial force in rafter (b) Shear force in rafter (c ) Deflection in rafter (d) Bending moment in rafter

Last Answer : (d) Bending moment in rafter

Description : Repair roof shingles that were damaged in storm.?

Last Answer : You must first pull off the damaged shingle. After doing so, replace with a new shingle and secure the shingle with four nails.If a shingle is simply cracked or torn, you don't have to replace it, ... apply a second bead of sealant on top of the crack. Then spread the sealant with a putty knife.

Description : If a cooling fan does not work properly, then which computer function and part is likely to get damaged first?

Last Answer : The CPU usually gets damaged first

Description : If they don’t reinforce spiked heels, should they in the case of obese women?

Last Answer : Really? I have never seen an obese woman in spike heels.

Description : Williot-Mohr diagram is used to determine a.slope of beams b.107 dynes c.deflection in beams d.deflection in trusses e.slope of trusses

Last Answer : d. deflection in trusses

Description : Unit Test: Poetry of the Harlem RenaissanceThink about the two specific stanzas that the blues singer sings in “The Weary Blues.” What happens in each of the stanzas How does the contrast between the two songs reinforce the overall theme of the poem?

Last Answer : several of Watts's stanzas memorized

Description : How does Christianity reinforce existing social structures?

Last Answer : By being the foundational perspective of correct belief andthinking, thereby giving birth to an imperative of societal normsby which these structures themselves can pivot point from.

Description : How do the continuity and predictability of the annual ceremonies reinforce the community's values?

Last Answer : Everything is organized and controlled by the elders. So peopledon't have to think for themselves. Because they are told what todo and when to do it.

Description : What formatting features are best used to attract a readers attention and reinforce a message?

Last Answer : Feel Free to Answer

Description : The most prominent way to reinforce company brand identity on the website is known as a) Designing b) Logo c) Domain views d) None of these

Last Answer : b) Logo

Description : The notion that domestic violence is rooted in the society's laws and customs that reinforce male dominance is known as the a. Political model of domestic violence. b. Medical model of domestic violence. c. "Rule of thumb." d. Battered wife syndrome.

Last Answer : a. Political model of domestic violence.

Description : m1 and m2 are the members of two individual simple trusses of a compound truss. The compound  truss will be rigid and determinate if  (A) m = m1 + m2 (B) m = m1 + m2 + 1  (C) m = m1 + m2 + 2  (D) m = m1 + m2 + 3

Last Answer : (D) m = m1 + m2 + 3

Description : The forces in the members of simple trusses, may be analysed by  (A) Graphical method  (B) Method of joints  (C) Method of sections  (D) All the above 

Last Answer : (D) All the above 

Description : Muller Breslau's principle for obtaining influence lines is applicable to (i) Trusses (ii) Statically determinate beams and frames (iii) Statically indeterminate structures, the material of which is elastic and follows Hooke's law (iv ... B) (i), (ii) and (iv) (C) (i) and (ii) (D) Only (i)

Last Answer : (A) (i), (ii) and (iii)

Description : The type of joint commonly used at the junction of a principal rafter and tie beam in timber trusses is (A) Mortise and tenon joint (B) Oblique mortise and tenon joint (C) Butt joint (D) Mitred joint

Last Answer : Answer: Option B

Description : Allowable crack width for reinforce concrete structure under normal conditions is [ A ] 0 [ B ] 0.1 mm [ C ] 0.2 mm [ D ] 0.3 mm

Last Answer : [ D ] 0.3 mm

Description : How to use weave sync securely?

Last Answer : answer:In regards to passwords Mozilla says Weave has end-to-end encryption , meaning even if someone were monitoring your internet connection, or looking at Mozilla's servers, they could not read ... and Safari. There has been grumbling about Weave's reliability, Xmarks is older and better tested.

Description : How do I store something securely?

Last Answer : What are you doing here? Go back to Yahoo Answers with the rest of the kids.

Description : Why were the British never able to securely hold the Carolinas?

Last Answer : What is the answer ?

Description : How to trade commodities online securely?

Last Answer : If one wants to trade commodities online securely, do as much research as possible and look first to reputable firms such as clear trade commodities. Also, talk to as many people as possible who trade on a regular basis.

Description : When a battery is continuously exposed to low temperatures, the best procedure to keep it from freezing is to _________. A. remove the battery caps B. securely cover the battery C. keep the battery fully charged D. disconnect the battery

Last Answer : Answer: C

Description : In a spring mass system of mass m and stiffness k, the end of the spring are securely fixed and mass is attached to intermediate point of spring. The natural frequency of longitudinal ... is attached decreases D) Decreases as the distance from the bottom end where mass is attached decreases

Last Answer : B) Is minimum when mass is attached to mid point of the spring

Description : The meaning of Extranet is a) Global information system b) Sharing devices update c) Windows for selling d) A private network system to securely share part of business information with their clients.

Last Answer : d) A private network system to securely share part of business information with their clients.

Description : Unpaid letters which are posted open or insecurely closed a) Should be sent to RLO b) Should be returned to the sender duly enclosed in a service cover c) Should be securely closed and forwarded to its destination in a service cover d) Should be securely closed and forwarded to its destination.

Last Answer : d) Should be securely closed and forwarded to its destination.

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it  

Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services

Last Answer : b. to allow intranet users to securely use specified internet services