Browse Definitions :
Definition

# degree per second

The degree per second (symbolized deg/s or deg · s-1) is a unit of angular (rotational) speed. This quantity can be defined in either of two senses: average or instantaneous.

Average angular speed is obtained by measuring the angle in degrees through which an object rotates in a certain number of seconds, and then dividing the total angle by the time. If uavg represents the average angular speed of an object (in degrees per second) during a time interval t (in seconds), and the angle through which the object rotates in that time is equal to q (in degrees), then:

uavg = q / t

Instantaneous angular speed is more difficult to intuit, because it involves an expression of motion over an "infinitely short" interval of time. Let p represent a specific point in time. Suppose an object is in rotational motion at about that time. The average angular speed can be measured over increasingly short time intervals centered at p, for example:

[p-4, p+4]
[p-3, p+3]
[p-2 , p+2]
[p-1, p+1]
[p-0.5, p+0.5]
[p-0.25, p+0.25]
.
.
.
[p-x, p+x]
.
.
.

where the added and subtracted numbers represent seconds. The instantaneous angular speed, uinst, is the limit of the measured average speed as x approaches zero. This is a theoretical value, because it cannot be obtained except by inference from measurements made over progressively shorter time spans.

Also see angular degree, angular speed, angular velocity, radian per second, International System of Units (SI), and Table of Physical Units.

This was last updated in May 2008
• network traffic

Network traffic is the amount of data that moves across a network during any given time.

• dynamic and static

In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

• Evil Corp

Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

• Trojan horse

In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

• quantum key distribution (QKD)

Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

• benchmark

A benchmark is a standard or point of reference people can use to measure something else.

• spatial computing

Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

• organizational goals

Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

• talent acquisition

Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

• employee retention

Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

• hybrid work model

A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

• database marketing

Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

• cost per engagement (CPE)

Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...