1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
10

A computer cooled by a fan contains eight PCBs, each dissipating 10 W power. The cooling air is supplied by a 25-W fan mounted a

t the inlet. If the temperature rise of air as it flows through the case of the computer is not to exceed 10 oC, determine (a) the flow rate of the air that the fan needs to deliver and (b) the fraction of the temperature rise of air that is due to the heat generated by the fan and its motor.
Computers and Technology
1 answer:
Kay [80]3 years ago
8 0

Given Information:  

Qin = 8*10 = 80 W

Win = 25 W

Temperature = T2-T1 = 10°C

Required Information:  

(a) flow rate of the air = m = ?

(b) fraction of the temperature rise of air = f = ?

Answer:  

(a) flow rate of the air m = 0.01044 kg/s

(b) fraction of the temperature rise of air f = 23.8 %

Solution:

(a) The flow rate of the air that fan needs to deliver can be found by

m = Q_{in}  + W_{in} /C_{p} (T_{2} -T_{1} )

Where the value of specific heat of air is 1005 j/kg.C

m = (80 + 25)/1005*10

m = 0.01044 kg/s

(b) fraction of the temperature rise of air due to fan

ΔT = Q/mCp

ΔT = 25/0.01044*1005

ΔT = 2.38°C

So the fan causes a temperature rise of 2.38°C

f = ΔT/T2-T1

f = 2.38/10

f = 0.238 = 23.8 %

You might be interested in
What position should you hand be on the steering wheel? yuyuyhj
Diano4ka-milaya [45]

Answer:

9 and 3

Explanation:

its the right way and njcs wdhiqgua wdiu posef

8 0
3 years ago
. Which of the following is NOT a
joja [24]

Answer:

solution

Explanation:

The correct option is - solution

Reason -

To solve a problem,

Firstly we give input , then system will process that input which then gives output.

Solution is not a part of the process.

So, Solution is not a significant part of a simple problem.

7 0
3 years ago
Using Windows CMD, how would an attacker list all the shares to which the current user context has access?
Lapatulllka [165]

Answer:

NET USE

Explanation:

The windows CMD is a command line interface or terminal used to access information about the system. The CMD can be also used to rectify or troubleshoot problems in the windows environment. There are series of hard coded commands in this interface.

An attacker uses the command "NET USE" to remotely connects or disconnects a computer and can be used to list the current connections of a user's computer.

8 0
3 years ago
Which of the following are examples of unstructured data?
Dafna11 [192]

Answer:

social media

Explanation:

this includes text, audio, images, and video.

6 0
2 years ago
Read 2 more answers
OSI model layers application in mobile computing
tino4ka555 [31]

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

7 0
3 years ago
Other questions:
  • A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
    14·1 answer
  • I’m which part of a profession email should you try to be brief, but highly descriptive
    7·1 answer
  • [Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
    12·1 answer
  • What is the different between 32bit anf 64 bit verision​
    11·1 answer
  • Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
    9·1 answer
  • The function of network switch is to _____.
    5·1 answer
  • Edra wants to consolidate the data from each of the regions. Switch to the Consolidated Sales worksheet, then update the workshe
    11·1 answer
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
  • How can you make sure that your private information<br> stays private?
    12·1 answer
  • 8. Suppose you've created a bulleted list, but the bullets are too close to the text. What is the best way to fix this?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!