When a switch is closed, completing an lr series circuit, the time needed for the current to reach one half its maximum value is _____ time constants?

Answers

Answer 1
The answer is 0.693 .  When a switch is closed, completing an LR series circuit, the time needed for the current to reach one half its maximum value is 0.693   

e^(-t/T) = 0.5 
-t/T = ln(0.5) = -0.693 

Related Questions

Answer these questions and label each answer with the correct number.

1. List the stages in the technology design process.
2. What are prototypes used to test?
3. Why do engineers redesign a product after testing a prototype?
4. To whom do engineers communicate the solution?

Thanks!

Answers

1) Goals, specifications, model, and then public opinion about the product
2) Prototypes are used to test whether the product works like it is is supposed to, and for the public to be convinced that they are not wasting money on a product that does not work
3) Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product
4) Engineers communicate with the company that hired them, or the government if applicable.

he technology design process, like scientific inquiry, does not always follow rigid steps. Often, engineers follow a common process: They identify a need, research the problem, design a solution, build and evaluate a prototype, troubleshoot and redesign, and communicate the solution.

A prototype is an early sample, model, or release of a product built to test a concept or process or to act as a thing to be replicated or learned from. ... A prototype is generally used to evaluate a new design to enhance precision by system analysts and users.

Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product

Engineers find solutions to the problems faced by the society . Once the solution has been devised the engineers communicate it to the laborers and the workers so the implement it on field or on the work stations.

An encrypted vpn link guarantees that the other end of the vpn connection is secure.
a. True
b. False

Answers

A-True
I hope this helps! :)

Answer:

The correct answer is letter "B": False.

Explanation:

Encrypted Virtual Private Networks (VPN) encode information so that only one computer with the correct decoder can read it so use it. The fact that one VPN is encoded does not imply that the VPN from where other user attempts to use it is encoded and secure. At least the encrypted VPN is safe but the other end is not unless encoded.

12. Which of the following is CourseBit®? (1 point)

an online class focused on drawing for architectural purposes

a leading Moodle™ development and hosting provider that focuses on highly customized systems

an icon in Blender® that allows you to easily switch between screens

a widget with which all animators should be familiar



13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around? (1 point)

non-blocking

non-overlapping

non-modal

non-confrontational

Answers

12. Which of the following is CourseBit®? 
a leading Moodle™ development and hosting provider that focuses on highly customized systems

13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around?
non-overlapping

Hope this helps.

Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and characters until a match occurs is known as ________.

Answers

The answer is Brute forcing.

You have a usb storage device that you cannot get working. you have enabled all appropriate usb options in the latest 2.2 kernel but still cannot get your device working. what is most likely the source of the problem?

Answers

the device might have a problem eg: a faulty usb port , or maybe you stick requires 3.0 usb ports

____ data updates in your destination document if there are changes to the source data
A) integrated
B) embedded
C) linked
D) field

Answers

I think its D (Field) I'm not sure but seems better than others.

Brittany is looking to advance in her current career. She is creating a plan to help strengthen and increase her skills. What question should she ask herself? What areas do I need to improve? What should I wear when I interview? When should I apply for a new job? Who do I know that can give me a better job?

Answers

Answer:

The correct answer is What area's do I need to improve.

Explanation:

This will help her alot

Answer:

A) What areas do I need to improve?

Explanation:

To strengthen her skills she needs to improve and be better.

References placed at the bottom of a page are known as _____.

Answers

sources, I don't think this is a computer question.
The references placed at the bottom of a page are known as citations. They are usually used to show were you have got evidence.

Questions on blender
2. Which of the following is a special mode for making changes to a object? (1 point)

edit mode

mesh mode

landscape mode

drawing mode



3. Which of the following do extrusion tools duplicate while keeping the geometry connected with the original vertices? (1 point)

vertices

edges

faces

circles

Answers

I believe the answer for 2 is Edit mode and the answer for 3 is edges. But im not 100%. I hope this helps if not i hope you find the correct answer. 

What type of device is characteristic of an enterprise environment?

Answers

A workstation used at an engineering firm.

You can upgrade a cpu by adding registers and cache memory to it.
a. True
b. False

Answers

False, to upgrade a CPU, you need to replace the CPU with a better CPU.

how long does the Splunk search job remain active

Answers

When you run a new search job, the job is retained in the system for a period of time, called the job lifetime. f the job is not accessed within the specified lifetime, the job expires and is removed from the system. There are two lifetime settings, 10 minutes and 7 days. The lifetime starts from the moment the job is run.

If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, what will be the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent?

Answers

The answer is : CLIENT will have 7 records  AGENT will have 4 records.  If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent is CLIENT will have 7 records  AGENT will have 4 records.       

How do you calculate the total voltage in a series circuit with more than one component?

Answers

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source.

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source. You can find total resistance in a Parallel circuit with the following formula: 1/Rt = 1/R1 + 1/R2 + 1/R3 +...

When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each interface a link-local unicast address. what is the order of steps involved in this autoconfiguration process?

Answers

1) The IPv6 implementation on the system construct a link-local address for
     each interface by using the fe80::/64 network address
2)  Using IPv6 Neighbor Discovery protocol, the system check if the
     address is a duplicate 
3) Knowing the link-local address is unique, it configures the interface to use
    that address
4) The system uses the Neighbor Discovery protocol to transmit Router
     Solicitation messages to the all routers multicast address 
5) The router on the link uses the ND protocol to relay Router
     Advertisement messages to the system 
6) By using the information it receives from the router, the system produce
    a routable address and configures the interface to use it 

Which three states can be applied to switches using vlan trunking protocol (vtp)? select one:
a. transparent, server, and client
b. secure, transparent, and gateway
c. master, server, and client
d. open, closed, and active?

Answers

The answer is (A) transparent, server, and client

A switch can be configured in any of the above VTP modes.

Transparent: VTP transparent switches forward VTP ads that they receive out their trunk ports in VTP version 2. However, VTP transparent switches don’t participate in VTP.

Server: In this mode, you can create, modify and delete VLANs. You can also specify other parameters like VTP pruning and VTP version for the entire VTP domain.

Client: This mode behaves the same as server, but you cannot create, modify and delete VLANs on a VTP client.






which of the following is not an advantage of using asynchronous data transmission

Answers

The following is not an advantage of using asynchronous data transmission :

a) Overhead of start and stop bits

b) False recognition of these bits due to noise on the channel

Answer:

Inexpensive software.

The expanded needham-schroeder protocol can be shortened to a 6-message protocol without loss of security by merely removing the 7thmessage. why is this true? (hint: the purpose of the 7thmessage is to prove to bob that he is talking to alice, but he already knows that. why?)

Answers

This is true since the ticket issued by KDC is enciphered by Alice's key, KAlice, so the one who can decrypt the fourth message and get the ticket to Bob is Alice only, which means that the one who is sending the ticket to Bob is Alice and nobody else.. (No one can get the ticket from the fourth message.)

While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using

Answers

The answer is DMNNAMSVR.  While in an interactive nslookup session, one would use the DMNNAMSVR keyword to change the DNS server one is using.

What is the physical address of the logical address 8205?

Answers

 I don't understand your question, like what do you mean?

Two major B2B models are ________. Select one: a. Auctions and social commerce b. Catalogs and vertical markets c. Sell-side marketplaces and e-sourcing d. Outsourcing and horizontal markets

Answers

the answer could be a i might be wrong
Answer:

The major two B2B models are c. e-sourcing and sell-side marketplaces.

Explanation:

B2B is a business to business model which means the exchange of goods or services which happens between corporations or organizations but not with customers. It is providing services or goods online to other company. Example, a cyber-security firm providing online service to an e-commerce company as part of risk mitigation plan to avoid credit card fraud.

The advantage of such model is sustainable and high-profit margin from repeated clients.

One disadvantage is this model will be having a smaller number of customers.

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier? (1 point)

virtual reality

email marketing

video conferencing

social media



15. One of the elements that make the internet such a significant development is its ability to do which of the following? (1 point)

connect people all around the world

stream movies

offer ecommerce

share photos

Answers

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier?
The correct answer is: social media

15. One of the elements that make the internet such a significant development is its ability to do which of the following? 
The correct answer is: connect people all around the world

_____ describes the way the components in a network interact.​

Answers

Logical Topology describes the way that components in a network interact.  Logical topology is the arrangement of devices on a computer  network and how they communicate with one another.  It describes how signals act on the network.  his type of topology is not interested in how devices on the network are connected but how they communicate with each other. 

A logical topology is how devices appear connected to the user. A physical topology is how they are actually interconnected with wires and cables.

the five steps in the fetch/execute cycle and how do they correspond to a restaurant

Answers

The five steps in the fetch/execute cycle are : 
1) Instruction Fetch (IF) - This starts with the moving from the memory to
     the control unit which is given by the program counter. The control unit
     can then access the data immediately from the memory.
2) Instruction Decode (ID) - what task the system has to do, where the
     results is to be stored and what operation is to be performed by which
     data.
3) Data Fetch (DF) - it gets the value from the memory.
4) Instruction Execute (IE) - The particular instruction is executed.
5) Result Return (RR) - The Result Value is restored in a
    particular memory location.  The return of new data resulting from
    (EX) that is put back into memory.

If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?

Answers

I would like to photograph a rose, because I have always been interested to know more about some flowers and what’s in the inside of them. Even though roses look pretty “simple” but beautiful in the outside, I suspect that there are a thousand of different things inside of it.

Answer and explanation:

Mainly, 3D microscopes are used in scientific research to observe the biologic composition of cells and microorganisms. If given the chance to use it to take some photographs, one good option could be to observe the cells of a zebrafish. Zebrafish have more than ten thousand (10,000) of cells that have the look of the sun's prominences. Comparing both of them could amaze us overall because of the difference in real sizes between but the similarity in shape.

should i get a razer phone or gpd win pls help!!?

Answers

I’m not sure what question you are asking

Including AND in an IF statement means more than one condition can be included in the statement. exactly one condition can be included in the statement. the result may be both true and false at the same time. a new spreadsheet is generated using only data that meets the conditions in the statement

Answers

A. Just took the test.

Answer:

more than one condition can be included in the statement.

Explanation:

For example, if your mom tells you:

"You can only go out tonight if you do your homework and clean up your room"

The word and in the if condition is used to add another condition to the existant one, so the use of the word and in If statements is used to add more than one condition to the statement.

In the launch of the Space shuttle Discovery what does "auto sequence start" mean?

Answers

The countdown clock before a rocket launches is one of the most remarkable timepieces in the world. As indicated by the "T-minus" mark, the hours and minutes tick down to launch. “Auto sequence start” is a breakdown of some of the big milestones leading up to that final moment. If there are no technical issues, at T-minus 31 seconds, the ‘go’ command will be given “Auto sequence start” which means the Ground launch sequencer will hand off primary control. It will be handed off to the shuttle’s onboard computers.

Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing?

Answers

Answer:

Software as a Service (SaaS).

Explanation:

   SaaS has been a strong trend in the business world. It is an acronym for Software as a Service, which means in our language software as a service.

    That is, they are online applications that can be used on your computer, tablet or mobile phone simply and remotely.

    It is a program that is not installed and that is used as a service by connecting to the Internet.

    As a service, it means that the customer does not purchase a license for a product but the right to enjoy the service offered.

    Therefore, all work related to the software is in the vendor's hands.

    Making a product available in SaaS format is a way of distributing content or technology solution in a more accessible and secure way.

    Software as a service may also be known by other names, such as web-based, on-demand, or hosted software.

    Netflix is a notorious example of SaaS that has gained prominence worldwide.

A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of:

Answers

The answer is Event.  A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.
Other Questions
The presence of the protein albumin in the urine is known as within the ovary, progesterone is produced by the Currently, in the united states, of howard gardner's nine intelligences, _____ and _____ intelligence are prized, and these two abilities are at the core of most tests of aptitude and achievement. What is the domain of the function What is the volume of a balloon of gas at 842 mm Hg and -23 C, if its volume is 915 mL at a pressure of 1,170 mm Hg and a temperature of 24C? How do you evaluate this equation: a number decreased by the difference of m and 7? Please help and quick!! Robert wants to add noise to his photo. Which of these effects should he use?A)miniature effectB)toy effectC)soft focus effectD)grainy B/W effectE)zoom effect Which layer of the Sun could this image be referring to? Describe two ways blood is helped back to the heart in veins. mention relevant body systems. Question 49 not yet answered points out of 1.00 not flaggedflag question question text what sequence of events usually occurs in the process of protein synthesis? select one:a. rna protein dnab. protein rna dnac. dna rna proteind. rna dna protein What is rip van winkles's relationship with nature? How to convert ascii to hexadecimal? simplify this expression 3x^2 y^2/24x A stop sign has 8 equal sides. If each side is 11 inches in length, what is the perimeter of the stop sign? Why did President Jefferson hire Meriwether Lewis and William Clark? -to open the port of New Orleans -to explore the Louisiana Territory -to acquire Oregon Country -to purchase Florida from Spain 1. Suppose the population of deer in a region was 3500 in the year of 2000 since when the population has grown by 3.5% annually what will the approximate population be in the year of 2020 y equals 8 x b x where a is the starting amount B is the growth rate increasing add to 1 and X is time.2.The population of New Haven was 148220 in 2004 since when the population has been decreasing at an annual rate of 2.9% if the rate of the decline continues what will the population be in the year 2015 Mid-nineteenth-century architecture in the west began to pay homage to the ________ style, which was clearly revived in the houses of parliament along the thames river in london. Democratic vs Republican views of immigration20 pointsA t-chart would be nice A woman who is on a low-carbohydrate diet for weight loss may have difficulty maintaining an adequate level of the b vitamins thiamin, riboflavin, niacin, and folate. what characteristic of her diet would cause this? exclusion of grain foods and cereals exclusion of fruits exclusion of dairy products exclusion of starchy vegetables Americans are proud of their sacrifices in World War 2. what might a soviet citizen have said about that?