1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
3 years ago
6

An electric kettle has the resistance of 30ohms what will flow when it connected to a 240v supply... find also the power rating

of the power​
Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
4 0

Answer:

Power = 1920 Watts or 1.92 Kilowatts

Explanation:

Given the following data;

Resistance = 30 Ohms

Voltage = 240 Volts

To find power rating of the kettle;

Mathematically, the power consumption of an electric device is given by the formula;

Power = voltage²/resistance

Substituting into the formula, we have;

Power = 240²/30

Power = 57600/30

Power = 1920 Watts or 1.92 Kilowatts

You might be interested in
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
Henry has to create software that manages a database of all his clients of his firm. He wishes to run software on another comput
soldi70 [24.7K]

Answer:

The answer is B.

Explanation:

8 0
3 years ago
Read 2 more answers
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
Mary needs to choose the menu in order to place the text in a desired fashion around the image.
n200080 [17]
Can you be more specific?

7 0
3 years ago
Read 2 more answers
TLE 10 - ICT
Kipish [7]

Answer:

Information And Communication Technology

5 0
2 years ago
Other questions:
  • What is a benifit of having a client/server network?
    6·1 answer
  • Uses of computer in daily life
    9·2 answers
  • What is the price of a k1 speed birthday party?
    7·2 answers
  • What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period?
    15·1 answer
  • . What type of device is a computer? Where does it use?​
    14·1 answer
  • What is the difference between word processing software and email?
    12·2 answers
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm th
    14·1 answer
  • Which marketing strategy is represented by advertisers paying for online display ads?
    8·1 answer
  • These 2 questions PLEASEEE (:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!