1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
7

A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of

Computers and Technology
2 answers:
yulyashka [42]3 years ago
7 0

Answer:

A. 20 A.

Explanation:

The National Electrical Code (NEC) Table 310-16 states that unless there is another specific provision in this code, the overcurrent protection in relation to the conductor types that has an obelisk( ) mark shall not be greater than 15 amps for No. 14, 20 amps for No. 12, and 30 amps for No. 10 copper; or, in relation to aluminum and copper clad aluminum, it shall not be greater than 15 amps for No. 12 and 25 amps for No. 10 after factors for ambient temperature and number of conductors have been adjusted as necessary.

Therefore, a type TW cable containing two No. 12 copper conductors can not have more than 20 A (i.e. 20 amps) overcurrent protection.    

Arisa [49]3 years ago
3 0
I think it is 25 im not sure though
You might be interested in
Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
Olin [163]

Answer:

technical feasibility

Explanation:

This is the process of validating the technology assumptions, architecture and design of a product or project. A technical feasibility study shows the details of how you intend to deliver a product or service to customers. Puts into consideration the following :

materials, labor, transportation, where your business will be located, and the technology that will be necessary to bring all this together.

3 0
3 years ago
Which team member on a project typically has a skill for creating visual interest?
bixtya [17]
I think designer i mean it should be
7 0
3 years ago
Read 2 more answers
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
Jamie is not sure a new medication will work because it has not had a large test group. Is Jamie being creative?
Mumz [18]
No, they're being skeptical.
4 0
3 years ago
Read 2 more answers
What is a specific set of instructions or steps used to solve a particular problem
Delvig [45]

An Algorithm

I will use a simple example to best explain this. I want to write a very small program that prompts a user to enter two numbers. Once these numbers are entered, they will be calculated and the sum displayed. The first step is to declare the variables. The second step is to pop a message for the user. The message will prompt the user to enter the numbers which will calculate themselves in the 4th step and populate a sum in the final step. This is what is referred to as an algorithm. An Algorithm is a step by step process required to offer a solution for a problem or to complete a particular task like the one above.

5 0
4 years ago
Other questions:
  • A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of ba
    5·1 answer
  • Design pseudocode for a program that will permit a user to store exactly 50 numbers in an array. Create an array big enough to h
    10·1 answer
  • Need help ppplllleeeassse<br><br> Hhheeelllppp
    15·2 answers
  • Why operating system is important software for a computer give five reasons
    13·1 answer
  • What are the differences between tkinter toolkit and PyQt?
    14·1 answer
  • Write a program that will read the payroll file. It should output the name and paycheck amount. Also output the total pay of all
    13·1 answer
  • What type of security software prevents, detects, and removes malware that tries to collect personal information or change compu
    13·1 answer
  • Create a while loop to try making a video game turn based battle.
    9·1 answer
  • Davids family took him to a hospital as he was suffering from a sericous ailment
    8·1 answer
  • What is the process of ensuring that corporate security policies are carried out<br> consistently?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!