1. The primary of a step-up transformer connected to a 120 V source has 200 turns. If the output is 480 V, how many turns does the secondary have?
2. The primary of a step-down transformer connected to a 240 V source has 1500 turns. The secondary has 200 turns. What is the output voltage of this transformer?
3. A laptop computer requires 24 volts to operate properly. A transformer with 600 turns in the primary needs to have how many turns in the secondary to operate the computer from a 120 V source?
4. If the output current for the transformer in the previous problem is 4.5 A, calculate the input current.
5. A transformer has an input of 24 V and an output of 36 V. If the input is changed to 12 V what will the output be?
6. A model electric train requires 12 V to operate. When connected to a household voltage of 120 V, a transformer is needed. If the primary coil has 250 turns, how many turns must the secondary coil have?
7. A transformer has 25 turns in the primary coil and 200 turns in the secondary coil. If 24 V is connected to the primary coil and a 20-Ω device is connected to the secondary coil, calculate the current in Amperes passing through the device.
8. Neon signs need 12,000 V to operate. If a transformer operates off a 240 V source and has 1000 turns in its primary coil, how may turns must the secondary coil have?
9. A power of 200 kW is delivered by power lines with 48,000 V difference between them. Calculate the current, in amps, in these lines.
10. If the lines in problem #9 above, have a resistance of 100-Ω, calculate the change of voltage along each line.
In: Physics
Describe the basic ideas included in Kohlberg's theory of moral development (see video lecture and Barkan, p. 114). How is moral development related to crime and deviance according to Kohlberg? Compare and contrast Moral Development theory with one other psychological explanation for crime
In: Psychology
The superintendent of the Middletown school district wants to know which of the districts three schools has the lowest rate of parent satisfaction. He distributes a survey to 1,000 parents in each district which asks if the parent is satisfied with their child’s school, and all of these parents respond. Here are the results school
school A |
school B |
school C |
total |
|
not satisfied |
248 |
250 |
300 |
798 |
satisfied |
752 |
750 |
700 |
2202 |
Total |
1000 |
1000 |
1000 |
3000 |
a. Percentage the table in a way that best answers the superintendent’s question
b. Calculate the percentage point difference between the rate of satisfaction at school A and school B, between the rate of satisfaction at school A and school C, and between the rate of satisfaction at school B and school C. Explain what these numbers mean in English.
c. Calculate the chi square value of this table
d. Are the differences shown in this table statistically significant at the 95% level?
e. Based on what you found in (b) and (d), and using your own judgement, how would you answer the superintendent’s question?
In: Math
Please, write code in c++. Using iostream and cstring library.
You given a text.Your task is to write a function that will find
the longest sequence of digits inside.
Note that the output have to be presened just like in sample.
Note. The program have to use pointer.
Input:
First line contains one line that is not longer than 1000.
Output:
The longest sequence of numbers.All numbers are positive and
integers.
example:
input: 101 fdvnjfkv njfkvn fjkvn jffdvfdvfd2010
output: 2010
In: Computer Science
review of related literature about development of fire response system
In: Computer Science
Please, write code in c++. Using iostream library.
Most modern text editors are able to give some statistics about
the text they are editing. One nice statistic is the average word
length in the text. A word is a maximal continuous sequence of
letters ('a'-'z', 'A'-'Z'). Words can be separated by spaces,
digits, and punctuation marks. The average word length is the sum
of all the words' lengths divided by the total number of
words.
For example, in the text "This is div2 easy problem". There are 5 words: "This"is"div"easy" and "problem". The sum of the word lengths is 4+2+3+4+7 = 20, so the average word length is 20/5 = 4.
Given a text, return the average word length in it. If there are no words in the text, return 0.0.
Input
The first line will contain the text of length between 0 and 50
characters inclusive. Text will contain only letters ('a'-'z',
'A'-'Z'), digits ('0'-'9'), spaces, and the following punctuation
marks: ',', '.', '?', '!', '-'. The end of text will be marked with
symbol '#' (see examples for clarification).
Output
Output should contain one number - the average length. The returned
value must be accurate to within a relative or absolute value of
10-9.
example:
input:
This is div2 easy problem.#
output:
4.0
In: Computer Science
package questions;
public class File {
public String base; //for example, "log" in
"log.txt"
public String extension; //for example, "txt" in
"log.txt"
public int size; //in bytes
public int permissions; //explanation in toString
//DO NOT MODIFY
public String getBase() {
return base;
}
/**
*
* @param b
* if b is null or if empty (""), base should become
"default",
* for all other values of b, base should become
b
*/
public void setBase(String b) {
//to be completed
}
//DO NOT MODIFY
public String getExtension() {
return extension;
}
/**
*
* @param e
* if e is null or if empty (""), extension should
become "txt",
* for all other values of e, extension should become
e
*/
public void setExtension(String e) {
//to be completed
}
//DO NOT MODIFY
public int getSize() {
return size;
}
/**
*
* @param s
* if s is less than 0, size should become 0
* if s is more than or equal to 0, size should become
s
*/
public void setSize(int s) {
//to be completed
}
//DO NOT MODIFY
public int getPermissions() {
return permissions;
}
/**
*
* @param p
* if p is less than 0, permissioons should become
0
* if p is more than 7, permissions should become
7
* if p is between 0 and 7 (inclusive on both sides),
permissions should become p
*/
public void setPermissions(int p) {
//to be completed
}
//DO NOT MODIFY
public File() {
setBase("default");
setExtension(".txt");
setSize(0);
setPermissions(0);
}
/**
*
* @param b: value for base
* @param e: value for extension
* @param s: value for size
* @param p: value for permissions
*/
public File(String b, String e, int s, int p) {
//to be completed
}
//DO NOT MODIFY
public String getName() {
return base + "." +
extension;
}
/**
*
* This method should set the size to 0, permission to
0, extension to null and base to null.
*
* Note that your File constructor and setters must be
correct to pass the JUnit tests.
*
*/
public void wipe() {
//to be completed
}
/**
*
* @param other
* @return
* 1 if calling object is bigger in size than the
parameter object
* -1 if calling object is smaller in size than the
parameter object
* 0 if calling object has the same size as the
parameter object
*/
public int compareTo(File other) {
return 0; //to be completed
}
/**
*
* @param other
* @return true if calling object and parameter object
are identical
* in every aspect (base, extension, size,
permissions)
*
* NOTE: file name should be checked in case
INsensitive manner
*
* HINT: Strings are NOT compared using == (s1 == s2 is
WRONG)
* Google "String comparison java" and "String case
insensitive comparison java" to
* see the right way!
*/
public boolean equals(File other) {
if(other instanceof File) {
return (new String("size1").equals(other.size)&&new String("base1").equalsIgnoreCase(other.base)&&new String("permission1").equals(other.permissions) && new String("extension1").equalsIgnoreCase(other.extension));
}
return false;
}
/**
* @return a new folder object with the same
permission, size, base and extension as the calling object.
* (In other words, return a deep copy of the calling
object.
*/
public File clone() {
return null; //to be
completed
}
/**
* HD
* return String representation of the calling
object.
*
* Size:
*
* 1024 bytes = 1 kilobyte (KB)
* 1024 kilobytes = 1 megabyte (MB)
* 1024 megabytes = 1 gigabyte (GB
*
* for files below 1024 bytes, you should represent
size in bytes (B)
* for files 1024 bytes or more but less than 1024
kilobytes, you should represent size in kilobytes (KB)
* for files 1024 kilobytes or more but less than 1024
megabytes, you should represent size in megabytes (MB)
* for files 1024 megabytes or more, you should
represent size in gigabytes (GB)
*
* only the integer part of size should be
displayed.
*
* Permissions:
*
* Permissions is a number between 0 and 7.
* 1st bit represents read permission,
* 2nd bit represents write permission,
* 3rd bit represents execute permissiono
*
* 0: 000 (---)
* 1: 001 (--x)
* 2: 010 (-w-)
* 3: 011 (-wx)
* 4: 100 (r--)
* 5: 101 (r-x)
* 6: 110 (rw-)
* 7: 111 (rwx)
*
*
https://www.tutorialspoint.com/unix/unix-file-permission.htm
*
* Syntax of toString:
* <permissions in (r/-)(w/-)(x/-) format>
<file name> <integer size in correct magnitude>
*
* Some examples:
* if base = "log", extension = "txt", size = 1056,
permissions = 4,
* the String returned should return
*
*
"r--
log.txt 1KB"
*
* if base = "data", extension = "csv", size = 4500000,
permissions = 7,
* the String returned should return:
*
*
"rwx
data.csv 4MB"
*/
public String toString() {
return ""; //to be completed
}
}
In: Computer Science
how is the 19th century industrialization related to the development of sociology thought
In: Psychology
How can community based risk reduction issues be addressed within the community and surrounding communities?
In: Psychology
How does Friedman’s claim “anything that can be done will be done” influence sustaining competitive advantage through technology with Apple and Google?
In: Operations Management
Please, write code in c++. Using iostream library
A chessboard pattern is a pattern that satisfies the
following conditions:
• The pattern has a rectangular shape.
• The pattern contains only the characters '.' (a dot) and 'X' (an
uppercase letter X).
• No two symbols that are horizontally or vertically adjacent are
the same.
• The symbol in the lower left corner of the pattern is '.' (a
dot).
You are given two numbers. N is a number of rows and
M is a number of columns. Write a program that generates
the chessboard pattern with these dimensions, and outputs
it.
Input
The first line contains two numbers N and M (1 ≤
N ≤ 50, 1 ≤ M ≤ 50) separated by a
whitespace.
Output
Output should contain N lines each containing M
symbols that correspond to the generated pattern. Specifically, the
first character of the last row of the output represents the lower
left corner (see example 1).
example:
input:
8 8
output:
X.X.X.X.
.X.X.X.X
X.X.X.X.
.X.X.X.X
X.X.X.X.
.X.X.X.X
X.X.X.X.
.X.X.X.X
In: Computer Science
Chapter 14: Language
What is the relationship between language and communication? Does a lack of advanced language in imply a lack of communication? How does your own language impact communication?
What qualifies as a language? What areas of the brain helps us communicate vs develop a language?
Also share unique words you utilize with your friends and family. How would the rest of us understand the meaning? Are those words part of a difference language?
In: Psychology
Two 24.0mL samples, one 0.200 MKOH and the other 0.200 M CH3NH2, were titrated with 0.100 MHI. Answer each of the following questions regarding these two titrations.
What is the volume of added acid at the equivalence point for KOH?
What is the volume of added acid at the equivalence point for CH3NH2?
Predict whether the pH at the equivalence point for each titration will be acidic, basic, or neutral.
Predict which titration curve will have the lowest initial pH.
Thanks!
In: Chemistry
Explain whether the dividend policy of a company affects its
value, by describing the
various theories that have been put forward in the literature.
Provide for each theory at
least two references from published papers in scientific journals
(approximately 1,000
words).
In: Finance
Draw Data Flow Diagrams for the following system. Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all of the details of the system described in the following narrative. Context diagram, Level-0, and Level 1 diagrams are required. You may choose to decompose to level-2, level-3, etc., if you think it’s necessary or if you would like to challenge yourself.
Urban Life Club (ULC) is an innovative young firm that sells memberships to people who have an interest in certain products. People pay membership fees for one year and each month receive a product by mail. For example, ULC has a coffee-of-the-month club that sends members one pound of special coffee each month. ULC currently has five memberships (coffee, wine, beer, flowers, and computer games) each of which costs a different amount. When people join ULC, the customer needs to provide his/her information including the name, mailing address, phone number, e-mail address, credit card information, start date, and membership service(s) (e.g., coffee). The computer game membership operates a bit differently from the others. In this case, the member must also select the type of game (action, arcade, fantasy/ science-fiction, educational, etc.) and age level. Some customers request more products than the membership included (e.g., two pounds of coffee), in which case they will need to pay for the additional costs. ULC is planning to greatly expand the number of memberships it offers (e.g., video games, movies, toys, cheese, fruit, and vegetables) so the system needs to accommodate this future expansion.
In: Computer Science