1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
5

The power relationship on a transformer states that O Power in = power out + loss O Power in = 1/2 power out (Power in = 2 x pow

er out O All of the above None of the above​
Computers and Technology
1 answer:
lions [1.4K]3 years ago
5 0

Answer:

D

Explanation:

You might be interested in
A firewall, when properly implemented, can prevent most attacks on your system.
Verizon [17]
This is true, A firewall is used to get rid of viruses and attackers and keep them out of your computer. But if not properly implemented can do next to nothing for you.
5 0
4 years ago
Read 2 more answers
?What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
pickupchik [31]
Open flow protocol is used
6 0
3 years ago
1. Which of the following describes a way of memorizing a poem using a mnemonic device?
xenn [34]

Answer:

Singing the words of the poem to the tune of Happy Birthday"

Explanation:

Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.

Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.

3 0
3 years ago
Select the correct answer.
siniylev [52]

Answer:A

Explanation: J pegs are easily saved and accessed anywhere and show good quality

8 0
3 years ago
CPT, which is used to code procedures in an office, is an example of a/an
ExtremeBDS [4]
 <span>Current Procedural Terminology

is used for general check up

</span>
3 0
3 years ago
Other questions:
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • Write the equivalent c++ expression for the following algebraic expressions
    11·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • A slide can have which of the following?
    7·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • What are possible penalties if a designer is caught breaking copyright laws?
    13·1 answer
  • A is a program for editing,rearranging and storing text
    13·2 answers
  • Parameters and return make
    10·1 answer
  • Which software package allows developers to deploy applications using the exact same environment in which they were developed?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!