two transformer connected in parallel.tap change are different.if i want to on the buscoupler what happen?
1 3948Why in medium voltage system(3.3kv to 33kv, neutral is earthed with either resistance, reactance or neutral grounding resistance?
4 10093The 4/5th part of volume of a piece of wood is swiming as well as sunk in a fluid. if the relative dencity of wood is 0.8 then what will be the dencity of fluid in KG/M3. PLEASE ANSWER WITH SOLUTION.
2 4737A Wheel accelerates from rest with an acceleration of 6 rad/sec seq. How many revolutions are experienced in 4 sec.? give answer with solution.
4 12569a 3 phase slip ring induction motor is wound for 4 poles on stator and 6 poles on rotor; when 3 phase balanced voltage source at 50 hz is applied to motor it will run at a)1500rpm b)1000rpm c)750 rpm d)zero rpm
13 26041what exactly 3by2 directional control valve means and how direction control valves work can any one explain me the diagrm please i need it must and should
1 4271Post New Essar Interview Questions
State the advantages of shell scripting?
What are selectors in objective-c?
What pressure is highest L.O. Gravity Head or S.W. of the stern tube circulation
How do you add a subreport to a report in Crystal Reports?
What is DTX? Why is it used?
we create a pf with 3 fields.2 is defined as keyfields.we lock it with alcobj command.how we find out whether the file is locked or not?is it dspfd??/
How do I run a subprocess with pipes connected to both input and output?
What is difference between clustered index and non clustered index?
Which is the parent class of list
What is windows daemon?
hi friends i recently finished testing course in hyderabad.now am looking for a job in uk.i need help about the projects in interview point.can any one explain me abt banking project or credit card.like what are the problems faced in u r last project etc.
Are streams faster than for loops?
What does dynamics of machines deals with ?
What's the difference between super() and super(props) in React when using ES6 classes?
What factors would you consider before deploying a web intrusion detection system?