Skip to main content

Spin of elementary particles

Elementary particles are particles for which there is no known way of dividing them into smaller units. Theoretical and experimental studies have shown that the spin possessed by such particles cannot be explained by postulating that they are made up of even smaller particles rotating about a common center of mass (see classical electron radius); as far as can be determined, these elementary particles have no inner structure. The spin of an elementary particle is a truly intrinsic physical property, akin to the particle's electric charge and rest mass.

It turns out that a convenient definition of the spin quantum number s is s = n/2, where n can be any non-negative integer. Hence the allowed values of s are 0, 1/2, 1, 3/2, 2, etc. The value of s for an elementary particle depends only on the type of particle, and cannot be altered in any known way.

All known matter is ultimately composed of elementary particles called fermions, and all elementary fermions have s = 1/2. Examples of fermions are the electron and positron, the quarks making up protons and neutrons, and the neutrinos. Elementary particles emit and receive one or more particles called bosons. This boson exchange gives rise to the three fundamental interactions ("forces") of the Standard model of particle physics; hence bosons are also called force carriers. These bosons have s=1. A basic example for a boson is the photon. Electromagnetism is the force that results when charged particles exchange photons.

Theory predicts the existence of two bosons whose s differs from 1. The force carrier for gravity is the hypothetical graviton; theory suggests that it has s = 2. The Higgs mechanism predicts that elementary particles acquire nonzero rest mass by exchanging hypothetical Higgs bosons with an all-pervasive Higgs field. Theory predicts that the Higgs boson has s = 0. If so, it would be the only elementary particle for which this is the case.

http://en.wikipedia.org/wiki/Spin_%28physics%29

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...