Mount Payne

Mount Payne is a 2,468-metre (8,097-foot) mountain summit located in the Canadian Cascades of southwestern British Columbia, Canada. It is situated 27 km (17 mi) southeast of Hope, 14 km (9 mi) northeast of Chilliwack Lake, and 4 km (2 mi) west of Silvertip Mountain, which is its nearest higher peak. Following Silvertip, Mount Payne is the second-highest summit in the Hope Mountains, a subset of the Skagit Range.[3] The peak was first climbed in 1950 by J. Bussell, H. Genschorek, I. Kay, A. Melville, and W. Sparling.[1] The peak was named for Damasus Payne, a Benedictine monk and mountaineer who tragically fell to his death on Edge Peak in 1978.[1] Payne was responsible for naming mountains such as Mount Rohr and Mount Duke. He also carried all the materials for mass and communion up to the summit of Slesse Mountain to perform a ceremony to honor the victims of Trans-Canada Air Lines Flight 810.[1] Mt. Payne's name was officially adopted May 7, 1984, by the Geographical Names Board of Canada.[4] Precipitation runoff from the peak drains into headwaters of the Sumallo River, and into the Klesilkwa River, which is a tributary of the Skagit .

Mount Payne
Mount Payne seen from Eaton Peak
Highest point
Elevation2,468 m (8,097 ft)[1]
Prominence378 m (1,240 ft)[1]
Parent peakSilvertip Mountain[1]
Coordinates49°10′04″N 121°16′29″W[2]
Geography
Mount Payne
Location in British Columbia
Mount Payne
Mount Payne (Canada)
LocationBritish Columbia, Canada
Parent rangeSkagit Range
Canadian Cascades
Topo mapNTS 92 H/3
Geology
Mountain typeIntrusive
Type of rockgranitic
Climbing
First ascent1950 J. Bussell, H. Genschorek, I. Kay, A. Melville, W. Sparling
Easiest routeScrambling via south ridge[1]

Geology

Mount Payne is related to the Chilliwack batholith, which intruded the region 26 to 29 million years ago after the major orogenic episodes in the region. This is part of the Pemberton Volcanic Belt, an eroded volcanic belt that formed as a result of subduction of the Farallon Plate starting 29 million years ago.[5][6][7]

During the Pleistocene period dating back over two million years ago, glaciation advancing and retreating repeatedly scoured the landscape leaving deposits of rock debris.[8] The "U"-shaped cross section of the river valleys are a result of recent glaciation. Uplift and faulting in combination with glaciation have been the dominant processes which have created the tall peaks and deep valleys of the North Cascades area.

The North Cascades features some of the most rugged topography in the Cascade Range with craggy peaks and ridges, deep glacial valleys, and granite spires. Geological events occurring many years ago created the diverse topography and drastic elevation changes over the Cascade Range leading to various climate differences which lead to vegetation variety defining the ecoregions in this area.

Climate

Most weather fronts originate in the Pacific Ocean, and travel east toward the Cascade Range where they are forced upward by the range (Orographic lift), causing them to drop their moisture in the form of rain or snowfall. As a result, the Cascade Mountains experience high precipitation, especially during the winter months in the form of snowfall. Temperatures can drop below −20 °C with wind chill factors below −30 °C. The months July through September offer the most favorable weather for climbing Mount Payne.

gollark: It *might* be.
gollark: Row ID? I forget.
gollark: The number the uninstaller prints?
gollark: The incident report system does actually work, by the way. All incidents are logged in SPUDNET. The only ones I know of are the test ones I triggered to test the system and various incident triggers. Incidents are reported when:- one known sandbox escape is detected- banned programs (Webicity) are executed- potatOS is uninstalled- invalid disk signing key
gollark: You can't make a program to fully autonomously uninstall potatOS from within it - ignoring sandbox escapes - because while sandboxed processes can use queueEvent to fake keypresses they cannot read the output of the uninstaller. The best they can do is, I don't know, guess what the random seed was when it was generating two primes, figure out what the primes were, and queue the key/char events accordingly.

See also

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.