Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the following statements about these symbols is correct? A. Symbol 1 represents a fixed resistor, symbol 2 represents a fuse, symbol 3 represents a relay coil, and symbol 4 represents a lightbulb. B. Symbol 1 represents a battery, symbol 2 represents a lightbulb, symbol 3 represents a fuse, and symbol 4 represents a relay coil. C. Symbol 1 represents a wire connection, symbol 2 represents a battery, symbol 3 represents a variable resistor, and symbol 4 represents a fuse. D. Symbol 1 represents a fuse, symbol 2 represents a fixed resistor, symbol 3 represents a battery, and symbol 4 represents an SPST switch.

Answers

Answer 1
The answer to this question is: Symbol 1 represents a transistor, symbol 2 represents a diode, symbol 3 represents a resistor, and symbol 4 represents an LED.
Answer 2

lol whats the answer


Related Questions

Under the common criteria, which term describes the user-generated specifications for security requirements?

Answers

The correct answer to this question is the:

“Protection Profile (PP)”

According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.

Desktop publishing design tools are represented by A. icons. B. windows. C. trackballs. D. modems.

Answers

The best answer is A
Windows are the screens you can maximize and minimize.
Trackballs make the mouse move.
Modems are associated with internet connection.
Those three answers are unrelated leaving icons to be the most reasonable.

Look at the simple circuit illustrated in the figure above. What will happen when only switch S1 is closed?

A. No current will flow in the circuit.
B. Nothing will happen; the light bulb won't light up.
C. The light bulb will light up.
D. The resistance of the circuit will increase.

Answers

If only S1 is closed, due to the diode across S3 is pointing to the right, the current cannot be flowing to the left.

So nothing will happen, the bulb is not on.

Answer: A. No current will flow in the circuit.

Explanation:

The Figure 1 illustrates the equivalent circuit at only switch S1 closed. That is a series circuit with two diodes, a bulb, and a battery.

Suppose that there is a current flowing in the circuit. A current flowing in the circuit implies that D1 is on. If D1 is on, there should be 0.7 V between anode and cathode (see Figure 2 left). However, there is not possible a low voltage on the top and a high voltage at the bottom of D1 (see Figure 2 right). Then, it is not viable 0.7 V between anode and cathode of diode D1. Therefore, D1 is off.

Now, we already know that this is a series circuit with the diode D1 off, so we can conclude that no current will flow in the circuit.

Correct answer is A. No current will flow in the circuit.

There isn't current flowing in the circuit next the light bulb won't light up. But other things happen, for example, the high voltage goes to the light bulb at only switch S1 closed. we can say that option B. is partially wrong and options C. is wrong

Finally, there are no resistances in the circuit. So, option D. is not right

Kazaa software is commonly used to share audio and video files and documents over the internet. these files are located in? users' computers and not on a centralized server. kazaa is an example of? ________.

Answers

Kazaa software is commonly used to share audio and video files and documents over the internet., these files are located in the Cloud? Users' computers and not on a centralized server. Kazaa is an example of a peer to peer application.

Dns (domain name system) servers translate all domain names into _____.

Answers

they translate them into ip addresses.

A ________ is a device connected to a network such as a printer or a game console.

Answers

A printer or a game console is not a network. They themselves are connected to the network.

During a remote desktop session, explain the result of opening the network connections window on the remote computer and configuring the network adapter to use a different ip address.

Answers

Answer:

The user who is controlling the computer remotely would be disconnected.

Explanation:

A __________ tries to break it security and gain access to systems with no authorization, in order to prove technical prowess.

Answers

Black-hat hacker is the answer. Hope this helps.

Why would a server 2008 r2 dns server have a different security baseline than a windows xp client?

Answers

The Answer is If systems perform different functions, security settings can restrict one function but not the other. Also, XP is a desktop OS vs. Server 2008R2 is a Server OS. An XP client can never be a DNS server.

These questions are ambiguous and silly.

A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of integers can be stored in the computer? if 1’s complement is used? (express your answers in decimal.)

Answers

Two's-complement notation can represent all integers from - 2^(N-1) to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -128 to 127 inclusive. 

One's-complement notation can represent all integers from - 2^(N-1) - 1 to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -127 to 127 inclusive

The word length of a computer is simply the number of bits, the computer can process

The word length is given as:

[tex]n = 8[/tex]

(a) 2's complements

The smallest integer in the 2's complement is::

[tex]N= -(2^{n-1})[/tex]

While the largest integer is:

[tex]N= 2^{n-1} -1[/tex]

So, we have:

[tex]Smallest = -(2^{8-1})[/tex]

[tex]Smallest = -(2^7})[/tex]

[tex]Smallest = -128[/tex]

And the largest is:

[tex]Largest= 2^{8-1}-1[/tex]

[tex]Largest= 2^{7}-1[/tex]

[tex]Largest= 128-1[/tex]

[tex]Largest= 127[/tex]

Hence, the computer can store all integers from within an inclusive range of -128 to 127, using the 2's complement

(b) 1's complements

The smallest integer in the 1's complement is::

[tex]N= -(2^{n-1}) + 1[/tex]

While the largest integer is:

[tex]N= 2^{n-1} -1[/tex]

So, we have:

[tex]Smallest = -(2^{8-1})+1[/tex]

[tex]Smallest = -(2^7})+1[/tex]

[tex]Smallest = -128+1[/tex]

[tex]Smallest = -127[/tex]

And the largest is:

[tex]Largest= 2^{8-1}-1[/tex]

[tex]Largest= 2^{7}-1[/tex]

[tex]Largest= 128-1[/tex]

[tex]Largest= 127[/tex]

Hence, the computer can store all integers from within an inclusive range of -127 to 127, using the 1's complement

Read more about word lengths at:

https://brainly.com/question/5046303

A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) ________.

Answers

Email client as port 25 is the default port for an email server.

How many wires does a PCIe connection use for sending and receiving data?
=T

Answers

A PCIe connection uses one wire for sending and receiving. Each of the pairs of wires between a PCIe controller and a device is called lane PCI Express, in fact Peripheral Component Interconnect Express yet regularly observed abridged asPCIe or PCI-E, is a standard sort of association for inside gadgets in a PC.

Class sizes of various sections of college algebra at your university are an example of which type of data? quiizlet

Answers

Final answer:

Class sizes of various sections of college algebra at your university are an example of quantitative data, specifically discrete quantitative data.

Explanation:

The class sizes of various sections of college algebra at your university are an example of quantitative data. Quantitative data represents numerical values that can be measured or counted.

Specifically, the class sizes can be represented as discrete quantitative data, as the number of students in each section is a whole number value. For example, one section may have 30 students, another section may have 25 students, and so on.

What is significant about the contents of the destination address field?

Answers

The destination address field has a format similar to : ff:ff:ff:ff:ff:ff
What signifies the destination address and gives it a privilege over the source address is that it can either be a broadcast containing all ones or a unicast while the source address can only be a unicast.

Is a technique for representing an object as a stream of binary digits, which allows objects to be read and written from files with their state maintained?

Answers

The technique is called serialization and deserialization.

How do you prevent unauthorized personnel from accessing your cisco device through the console port?

Answers

You can blacklist the mac address of the device which you don't want to be connected.
It depends on a version of the console but in my view the most useful and effective way is to physically secure your device and protect it by a complex password. And keep your password in a safe place.

"list at least 3 key performance indicators that should be considered prior to initiating a cloud deployment."

Answers

You should fully understand the cloud and its various offerings in order to properly integrate it within the business. Some of the Key Performers Indicators that should be considered are:
1. Measure your customer growth
If the customer growth is declining, then something needs to be done. 
2.Take a hard look at your renewal rate
3.Calculate your average revenue per user (ARPU)

Digital still cameras most often use ____ cards for storage.

Answers

Digital still cameras most often use flash memory cards for storage.

Individuals belonging to the subculture known for love of motorbikes and leather. Rival of the group known as ‘mods’.

Answers

Individuals belonging to the subculture known for love of motorbikes and leather are called Rockers. Rival of this group is called 'mod'.
There were two conflicting British subculture, Rockers and mod. Rockers have love for leather, so they are also called as leather boys.
The subculture of Rockers was centered on motorcycling, while subculture of mod was centered on music and fashion.

A troubleshooter's ability to design and test hypotheses in order to solve a technology problem is based on ____.

Answers

A troubleshooter's ability to design and test hypotheses in order to solve a technology problem is based on critical thinking.

Critically to make informed decisions by critically evaluating different sources of data. As just a consequence, critical thinkers contain a wide range of other key talents, such as analysis, inventiveness, dilemma, and empathy.

It is a fundamental educational skill that enables students to question and comment according to their knowledge and facts. The ability is critical for students working on assignments or conducting research. It's also a valuable skill in a variety of workplace situations, and the ability of a troubleshooter to design and test ideas to solve a technological problem is dependent on critical thinking.

Therefore, the answer is "critical thinking ".

Learn more:

brainly.com/question/5793970

What subnet mask would you use when configuring a tcp/ip client with an ipv4 address on the 172.16.32.0/19 network?

Answers

172.16.32.0/19  = has a mask 255.255.224.0

What should you do if your temperature gauge moves up to just below the red zone?

Answers

If the temperature gauge moves up to just below the red zone,you should turn off your air conditioner and turn on your vehicle's heater. Then immediately find a mechanic or pull over safely and contact a road service.




Pull over when safe.
Turn off the car.
Let the car sit and cool off a fair amount.
Open the hood.
Use a rag or gloves to protect your hands from the heat.
Slowly very slowly with the gloves on after you have let the vehicle cool down a bit.
Open the radiator check if you have coolant in it.
If you don't you will need to refill it with the same coolant you use last time.
If you can't get coolant you can use water to get your car to a shop or home.
Using water can freeze when the temperature gets to low in winter
When water freezes it expands and will crack parts and can cause a lot of damage.
When you get your car to the shop or home flush out the radiator and fill it up with new coolant or antifreeze
Coolant or antifreeze sometimes come as a concentrate so you may mix it with water some you don't mix read the directions before you start.

A software architecture that divides an application into view, business logic, and data is called a(n) ________.â

Answers

Software architecture divides an application into views

Prior to the development of e-commerce, web sites primarily delivered static html pages. true

Answers

Prior to the development of e-commerce, web sites primarily delivered static HTML pages. true

Question3 why can you not install the server migration tools to the server running windows server 2008 r2 using the add roles and features wizard on your server running windows server 2012 r2?

Answers

After you've installed the Migration Tools on Windows Server 2012 R2, you can register the tools on a Windows Server 2008 migration source machine by running smigdeploy.exe from your Windows Server 2012 R2 migration destination machine, but you cannot install the tools on Windows Server 2008.

For full information about how to deploy the migration tools, including how to run smigdeploy.exe to get the tools registered on a Windows Server 2008 source machine, see Install, Use, and Remove Windows Server Migration Tools for Windows Server 2012.

Answer:

Explanation:

The truth is, hiring a professional web designer or design firm is not for everyone.

If you’re a new business without much revenue, then using an affordable website builder is exactly what you should be doing.

However, if you own a small or medium sized business, using a ‘free’ website builder could cost your company many tens of thousands of dollars in wasted man hours and even more money in the opportunity cost of lost potential revenue.

In this article, we will address several aspects of the debate, “web designer vs website builder?” Who would be better off hiring a professional and the specific advantages and disadvantages of doing either?

What is the major function of the network access layer?

Answers

Th network layer is the first layer of the OSI model. It determines the media used (CAT5/6/7/Fibre/Coax). The major function is to communicate with servers and workstations.

Here’s one about technology. IBM developed the first chess playing computer which won both a chess game and a chess match against reigning world champion at the time Garry Kasparov. Do you know what they called this smart robot?

Answers

The first chess playing computer which won both a chess game and a chess match against reigning world champion  at the Garry Kasparov was the smart robot, called Deep Blue.
Deep Blue was computer developed by IBM and it was evolved in 1989. It was the fastest computer on the championship. It was capable of evaluating 200 million positions per second.

Unordered lists are often identified by graphic images known as

Answers

Bullets, little black circles.

Explain your experience with the Internet including what search engine you typically use and why, how ethics play into the use of the information you gather, and how you protect your search privacy.

Answers

My experiences with the internet have been good, with not really and problems. I use Bing, a search engine created by Microsoft. I use Microsoft because I think I get better results, and with your searches you get points that you can redeem for prizes and rewards. I don't generally see anything that is ethnic related, I tend to stay on the path of schoolwork, and in my settings on my Bing account there is setting to protect my search history. 

On your computer desktop, you can see all sorts of different files, each immediately accessible. because you are actively working on them, and because you can open them whenever you want, these files are in fact very similar to the kind of information held in:

Answers

On your computer desktop, you can see all sorts of different files, each immediately accessible. because you are actively working on them, and because you can open them whenever you want, these files are in fact very similar to the kind of information held in working memory.

Answer:

Working memory

Explanation:

On a computer, Random Access Memory (RAM) is used as the working memory. It has the ability to store data for a short period of time and it is referred to as volatile because all data will be lost when your computer is shutdown or goes off abruptly. it has the capacity to store input data, programs, intermediate results and other forms of information.

Other Questions
A _____ is a tiny space between the axon of one neuron and the dendrites or cell body of another neuron. glial cell reticular formation synapse basal ganglia Bodhi has a collection of 175 dimes and nickels. The collection is worth $13.30. Which equation can be used to find n, the number of nickels in the collection?ANSWER- 0.1(175-n)+0.05n=13.30 Treating a minor health problem yourself without seeking professional help is Anoche jorge, ivn y yo salimos a cenar a mi tierra, un restaurante guatemalteco. nosotros (1) este lugar porque jorge (2) una rese?a (review) en internet que deca (said) que la comida es autntica y muy sabrosa. no es un restaurante elegante; entonces nosotros (3) de bluejeans. de verdad, en mi tierra mis amigos y yo (4) como (like) en casa. el camarero que nos (5) fue muy amable. para empezar, jorge e ivn (6) tamales, pero yo (7) esperar el plato principal: carne de res con arroz y frijoles. comimos tanto (so much) que no (8) nada de postre (dessert). ?fue una cena deliciosa! Ernesto tried to determine the solution for the system of equations using substitution. His work is shown below. x y = 7 3x 2y = 8 Step 1: x = y + 7 Step 2: 3(y + 7) 2y = 8 Step 3: 3y + 7 2y = 8 Step 4: y + 7 = 8 Step 5: y = 1 In which step did Ernesto make the first error? Stan and hilda can mow the lawn in 30 min if they work together. if hilda works twice as fast as stan, how long does it take stan to mow the lawn alone? Jean-pierre consumes only apples and bananas. he prefers more apples to less, but he gets tired of bananas. if he consumes fewer than 28 bananas per week, he thinks that one banana is a perfect substitute for one apple. but you would have to pay him one apple for each banana beyond 28 that he consumes. the indifference curve that passes through the consumption bundle with 31 apples and 40 bananas also pass through the bundle with x apples and 23 bananas, where x equals: When atoms of two or more elements are chemically bonded the substance formed is a? A worker produced a total of 198 mousetraps during a 6 hour run with no rejects and no downtime. A report states that this worker produced at a rate of 2 mousetraps per minute. Based on the actual production, is the rate of 2 mousetraps per minute accurate?Exit Test Write the equation in standard form for the parabola with vertex (0,0) and directrix y=-6 What is the capitol of Massachusetts? Ok so my teacher gives me this paper and i have to memorize all of the country capitols so he said the capitol of mass was Boston and hes wrong! I wanna make sure the capitolis springfield Mr. Wu is going to stock the concession stand for the Little League playoffs. He knows he will need at least twice as many hamburger buns as hotdog buns. Hamburger buns cost $0.45 each, and hotdog buns cost $0.40 each. He cannot spend more than $60 on buns. If x = the number of hamburger buns and y = the number of hotdog buns, which system of inequalities could be used to determine how many of each kind of bun Mr. Wu should purchase for the stand? if PA=14 and PD=10 what is the length of PC Jess observed that 60% of the people at a mall on a particular day shopped for clothes. If 2500 people at the mall did not shop for clothes that day, the number of people who shopped for clothes that day was ______. A plane flew for4hours heading south and for6hours heading east. If the total distance traveled was3,370miles, and the plane traveled45miles per hour faster heading south, at what speed was the plane traveling east? a blank is a possible explanation for a set of observations or answer to a scientific question What are the domain and range of f(x)=1/5x How did the arrival of Portuguese king John IV benefit the colony of Brazil?(Apex)A. He reformed the banking system and created a new currencyB. He instituted economic reforms that increased international tradeC. He expanded the country by invading BoliviaD. He transformed Brazil into a democracy True or false? because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises. what is the infinitive of the verb form of this word? indention Steam Workshop Downloader