1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
3 years ago
7

In doing a load of clothes, a clothes drier uses 18 A of current at 240 V for 59 min. A personal computer, in contrast, uses 3.0

A of current at 120 V. With the energy used by the clothes drier, how long (in hours) could you use this computer to "surf" the Internet?
Computers and Technology
1 answer:
amid [387]3 years ago
5 0

Answer:

11.76 hours or 11 hours 45 minutes

Explanation:

Given

Current\ for\ drier = I_d = 18A\\Voltage\ for\ drier=V_d=240V\\Time\ for\ drier=t_d=59\ min

We have to convert minutes into hours

So,

t=\frac{59}{60} = 0.98\ hours

Current\ for\ Computer=I_c=3.0A\\Voltage\ for\ computer=V_c=120V

As we are given that we have to find the time the computer will sustain using the same energy as the drier. So,

I_d*V_d*t_d=I_c*V_c*t_c\\18*240*0.98=3*120*t_c\\t_c*360=4233.6\\t_c=\frac{4233.6}{360}\\ t_c=11.76\ hours

<u>Converting into minutes will give us: 11 hours 45 minutes </u>

Therefore, with the same energy used by the drier, the computer can be used 11.76 hours to surf the internet ..

You might be interested in
If you were optimizing for performance and wanted to support potentially adding many new elements to an adt, then:
muminat

<span>If you were optimizing for performance and wanted to support potentially adding many new elements to an adt, then a list would allow faster addition of elements than an array. The object that contains the data of similar type is called an array. When the array is created, its length of array is established.</span>

7 0
3 years ago
This is using python.
Wittaler [7]

Answer:

discriminant = b * b - 4 * a * c

discriminant = b ** 2 - 4 * a * c

Explanation:

The operands are correct and in the right order (for python).

** is the operand for squaring something.

* is the operand for multiplying something.

- is the operand for subtracting something.

8 0
3 years ago
Read 2 more answers
A popular encryption method used to protect data that travel over a wireless network is ___
ddd [48]

Answer:

The most serious threat to offshore industrial systems is external access to control systems. Unwanted access to the human/machine interface (HMI) can allow third parties full control of a system. Zybersafe provides protection of the integrity of data that traverses the Ethernet connection between a company’s headquarters and a remote system.

4 0
3 years ago
How can you categorize computer on the basic of its brands.​
Naddika [18.5K]

Answer:

On the basis of brand computer are classified as:

• IBM Personal Computers.

• IBM compatible.

• Apple/Macintosh/Acer/LG/ Samsung etc.

hope it helps

pa brainliest po

8 0
2 years ago
Default tab stops are set in word every _______ inch.<br> a. ¼<br> b. ¾<br> c. ½<br> d. 1
UNO [17]
Default tab stops are set in word every 1/2 inch so your correct answer is C :)
5 0
3 years ago
Other questions:
  • What is a common method for testing a spot weld?
    13·1 answer
  • Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
    11·1 answer
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • You are creating a presentation and you have come to the last slide. you still have more information to add. what should you do?
    10·2 answers
  • What devices gives input​
    5·1 answer
  • Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
    13·1 answer
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
  • Every time a key is pressed on the keyboard, the _______________ chip in the keyboard notices which key has been pressed.
    13·1 answer
  • What are three coding languages that are used to build websites?
    12·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!