1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
4 years ago
8

A circuit contains three resistors connected in series. the value of r1 is 150 , the value of r2 is 60 , and the value of r3 is

620 . what is the total resistance in the circuit?
Computers and Technology
2 answers:
vlada-n [284]4 years ago
7 0
For calculating the total value of the resistances in a series circuit, we just add all of the values. In this case, it would be 150+60+620 which is 830Ω
tresset_1 [31]4 years ago
5 0

Answer:

830 Ω

Explanation:

For the resistors connected in series the voltage flowing through them is different while the current flowing through them is the same.

The reason for the different voltages flowing through each resistor in series is due to the resistance that each resistor preceding the other poses to the voltage that is passed through it. the formula used for calculating resistance of resistors in series is = R1 + R2 + R3 while for calculating resistance in parallel is = 1/R1 + 1/R2 + 1/R3 = 1/Ret

R1 + R2 + R3 = 150 + 60 + 620 = 830 Ω

You might be interested in
Which of these statements best describes an application programming interface?
TiliK225 [7]
<span>It is a set of commands, provided by the manufacturer of an operating system, which allows programmers to create applications.</span>
5 0
3 years ago
You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
Bezzdna [24]

You can use the Home key if your cursor is at the end of the word. Use the End key if you place the cursor on the left side of the word.

The Home and End keys are called the function keys. They act as functions and do not produce characters when pressed. Function keys move the cursor when you are creating or editing a document. The Home key moves the cursor at the beginning of a line in a word or a sentence and the End Key place the cursor at the end of the line.


8 0
4 years ago
A user states that when they power on their computer, they receive a "Non-bootable drive" error. The user works with external st
laila [671]

Answer:

B. Device boot order

Explanation:

The Device boot order makes a list of all the possible devices a system should check to in the operating system's boot files, as well as the proper sequence they should be in. Removable devices, hard drives, and flash drives are some devices that can be listed in the device boot order.

For the user whose computer displays a 'non-bootable drive' error, the device boot order would check all the devices listed to attempt booting from any of them. These devices might be in the order of removable discs, CD-ROM, hard drive. If all the options do not work, the computer would then do a Network boot. The order in which the devices are listed can be altered by the user.

8 0
4 years ago
Three common risk factors for young drivers and how you plan to minimize these factors.
djverab [1.8K]

Answer: making a simple mistake which ends in someone getting hit or close to being hit like not turning on your signal light

going too fast which makes it more difficult to make turns properly

if the car is a manual trying to start on a hill and rolling backwards into a car

Drivers ed and practicing in a parking lot or something or the sort

Explanation:

7 0
4 years ago
What is used for risk response control?
miskamm [114]

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

6 0
2 years ago
Other questions:
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
    9·1 answer
  • Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preforma
    8·2 answers
  • After assembling a computer system the very first software to be installed is​
    10·2 answers
  • You are sending Secret information to a colleague located at another office. You want to give him some background information an
    15·1 answer
  • What is Data rate?<br> What is BAUD RATE?<br> What is bandwidth?
    8·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
    11·1 answer
  • Ten ways ict has helped in social development
    7·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!