What core magnetic balance test of transformer? How to do this test in a three phase Star star (star-LV, star-HV) transformer? How to measure and where to measure?1 3066
why inverter rating is in KVA3 5529
A ceiling fan moves Counter clockwise & a pedestal fan clockwise.....y the difference????5 7665
Why starters are using the machines???5 4908
How to select cable rating for HT/LT Panels1 9948
in india why the generating voltage is like 11kv,22kv etc1 4113
What is the purpose of SOTF being used inspite of distance Protection given?7 41766
what is transformer tap change HT side and LT side1 3583
WHAT IS THE DIFFERENCE BETWEEN UNDERVOLTAGE COIL, CLOSING COIL AND SHUNT TRIP COIL OF AN ACB?2 34897
define reactive power?3 8352
what is pmu1 1307
What files can I delete to free up space?
Suppose we want to create an xs application and want to make it public. User should not need any hana database user to access this application. Is it possible? If yes, how? : hana xsjs
define holding company,public company, if the compnay be a public company what will the criteria? asked on 30/7/09
How to migrate paradox, dbase or foxpro database to firebird?
What is an operator in python?
What is the difference between make and new?
What is the difference between scala and spark?
How you can inspect the source code of a function?
Which objects are iterated in python?
Which is the state an app reaches briefly on its way to being suspended?
How do I add programs to the start menu in windows 10?
Name methods of classification methods?
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
State some precautions to be taken in case of powder metallurgy?
What do you know about modular programming?