1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
7

A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of

Computers and Technology
2 answers:
yulyashka [42]3 years ago
7 0

Answer:

A. 20 A.

Explanation:

The National Electrical Code (NEC) Table 310-16 states that unless there is another specific provision in this code, the overcurrent protection in relation to the conductor types that has an obelisk( ) mark shall not be greater than 15 amps for No. 14, 20 amps for No. 12, and 30 amps for No. 10 copper; or, in relation to aluminum and copper clad aluminum, it shall not be greater than 15 amps for No. 12 and 25 amps for No. 10 after factors for ambient temperature and number of conductors have been adjusted as necessary.

Therefore, a type TW cable containing two No. 12 copper conductors can not have more than 20 A (i.e. 20 amps) overcurrent protection.    

Arisa [49]3 years ago
3 0
I think it is 25 im not sure though
You might be interested in
David Rosen is credited with the development of which of these games?
nikklg [1K]
David Rosen is the CEO and lead programmer of Wolfire games. some of their games include Overgrowth, Desperate Gods, and Receiver.
4 0
3 years ago
Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic se
larisa86 [58]

The type of document should she create is  baseline document. Check more about the term Baseline below.

<h3>What is a Baseline document?</h3>

A Baseline document is known to be a kind official or legalized document that has passed through some measures of start approval and was used for its purpose.

Note that for Lin to be able to make the template for the configuration of Windows servers, the type of document that she can create is  baseline document.

Learn more about Windows servers  from

brainly.com/question/14526761

#SJ1

3 0
2 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
Write a Python function that takes a positive integer N and returns the factorial of N, i.e., N! The factorial of N, denoted N!,
sesenic [268]

Answer:

The python function is as follows:

def fact(N):

   factorial = 1

   for i in range(1,N+1):

       factorial = factorial * i

   return(factorial)

Explanation:

This line defines the function

def fact(N):

This line initializes the product of 1 to N to 1

   factorial = 1

This line iterates through 1 to N

   for i in range(1,N+1):

This line calculates the product of 1 to N i.e. factorial

       factorial = factorial * i

This line returns the factorial

   return(factorial)

6 0
3 years ago
PLEASE HELP!!!!!!!!!!! If you whisper while telling someone a secret, your nonverbal communication is          your verbal inter
Assoli18 [71]
The answer is repeating 
3 0
3 years ago
Other questions:
  • Which two technologies support the building of single-page applications?
    11·1 answer
  • The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
    7·1 answer
  • ossless compression tools generally use either Huffman coding or Lempel-Ziv-Welch (LZW) coding. Discuss the advantages and disad
    8·1 answer
  • What is the definition of digital literacy?
    7·2 answers
  • 11.The shortcut keys used to center a paragraph are&lt;br /&gt;a. CTRL+T&lt;br /&gt;b. CTRL+M&lt;br /&gt;c. CTRL+SHIFT+T d. CTRL
    7·1 answer
  • What are all the physical components called?
    6·1 answer
  • What will be displayed if the following Java code segment is run? System.out.println("one "); System.out.print("two "); System.o
    12·1 answer
  • Which function of NOS involves swapping programs and files
    6·1 answer
  • If you sort a portion of an Excel sheet and you get an error message such as #DIV/0, what is a likely cause of the error message
    9·1 answer
  • Will give brainly if answer all or my questions
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!