Premium Essay

00000000

In:

Submitted By weka
Words 388
Pages 2
1. At what point on the input cycle does the PIV occur?
2. For a half-wave rectifier, there is current through the load for approximately what percentage of the input cycle?
3. What is the average of a half-wave rectified voltage with a peak value of 10 V?
4. What is the peak value of the output voltage of a half-wave rectifier with a peak sine wave input of 25 V?
5. What PIV rating must a diode have to be used in a rectifier with a peak output voltage of 50V?

ANSWERS:-
1. PIV across the diode occurs at the peak of the input when the diode is reversed biased.
2. There is current through the load for approximately half (50%) of the input cycle.
3. The average value is 10 V/∏ = 3 .18 V
4. The peak output voltage is 25 V - 0.7 V = 24.3 V.
5. The PIV must be at least 50 V
SECTION 2-2
REVIEW
1. How does a full-wave voltage differ from a half-wave voltage?
2. What is the average value of a full-wave rectified voltage with a peak value of 60V?
3. Which type of full-wave rectifier has the greater output voltage for the same input voltage and transformer turns ratio?
4. For a peak output voltage of 45 V, in which type of rectifier would you use diodes with a PIV rating of 50 V?
5. What PIV rating is required for diodes used in the type of rectifier that was not selected in Question 4?

ANSWERS:-
1. A full-wave voltage occurs on each half of the input cycle and has a frequency of twice the input frequency. A half-wave voltage occurs once each input cycle and has a frequency equal to the input frequency.
2. The average value of 2(60 V)/∏ = 38.12 V
3. The bridge rectifier has the greater output voltage.
4. The 50 V diodes must be used in the bridge rectifier.
5. In the center-tapped rectifier, diodes with a PIV rating of at least 90 V would be required.
SECTION 2-3
REVIEW
1. When a 60 Hz sinusoidal voltage is applied to the input of a half-wave

Similar Documents

Premium Essay

Subnetting Assignment

...calculations or the way you get the answer, you will lose 50%. Your goal is to subnet them with as little subnet as possible but still meeting the requirement.  In other word, maximize the number of hosts that is available for each subnet. 26. 134.84.0.0/16 subnetted to 97 subnets and provide information for subnets #1, #8, #65, and #97 134.84.0.0/16 10000110 01010100 00000000 00000000 Network address 11111111 11111111 00000000 00000000 Subnet Mask The formula to find out how many bits to borrow 2 to the power off 7 = 128 need to borrow 7 bits. 7 bits = 0000001 New 10000110 01010100 00000000 00000000 Network Address 134.84.0.0/16 11111111 11111111 11111110 00000000 Subnet Mask 255.255.254.0 Subnet Mask #1 Network Address 10000110 01010100 00000010 00000000 Network Address 134.84.2.0 11111111 11111111 11111110 00000000 Subnet Mask 255.255.254.0 10000110 01010100 00000011 11111111 Broadcast Address 134.84.3.255 Available IP Addresses are 134.84.2.1 until 134.84.3.254 #8 Network Address Convert 8 to Binary =1000 10000110 01010100 00010000 00000000 Network address 134.84.16.0 11111111...

Words: 433 - Pages: 2

Free Essay

Qrq2R

... A|-------------|------------|------------|----------------------| F|-------------|------------|------------|----------------------| C|--5-5-5-0-00-|-8-8-8-0-00-|-5-5-5-0-00-|-8-8-8-8-10-10-10-10--| G|--5-5-5-0-00-|-8-8-8-0-00-|-5-5-5-0-00-|-8-8-8-8-10-10-10-10--| C|--5-5-5-0-00-|-8-8-8-0-00-|-5-5-5-0-00-|-8-8-8-8-10-10-10-10--| Chorus *x2 D|-----------|----------|----------|-----------| A|-----------|----------|----------|-----------| F|-----------|----------|----------|-----------| C|--00000000-|-33333333-|-88888888-|-7-10-5-3--| G|--00000000-|-33333333-|-88888888-|-7-10-5-3--| C|--00000000-|-33333333-|-88888888-|-7-10-5-3--| *x2 D|------------|-----------| A|------------|-----------| F|------------|-----------| C|--00-0-33-3-|-88-8-5-7--| G|--00-0-33-3-|-88-8-5-7--| C|--00-0-33-3-|-88-8-5-7--|...

Words: 566 - Pages: 3

Premium Essay

Cisco Pix

...IPSecuritas 3.x Configuration Instructions for Cisco PIX 500 Series (501, 506, 506E, 515, 515E, 520, 525, 535) © Lobotomo Software June 17, 2009 Legal Disclaimer Contents Lobotomo Software (subsequently called "Author") reserves the right not to be responsible for the topicality, correctness, completeness or quality of the information provided. Liability claims regarding damage caused by the use of any information provided, including any kind of information which is incomplete or incorrect, will therefore be rejected. All offers are not-binding and without obligation. Parts of the document or the complete publication including all offers and information might be extended, changed or partly or completely deleted by the author without separate announcement. Referrals The author is not responsible for any contents referred to or any links to pages of the World Wide Web in this document. If any damage occurs by the use of information presented there, only the author of the respective documents or pages might be liable, not the one who has referred or linked to these documents or pages. Copyright The author intended not to use any copyrighted material for the publication or, if not possible, to indicate the copyright of the respective object. The copyright for any material created by the author is reserved. Any duplication or use of such diagrams, sounds or texts in other electronic or printed publications is not permitted without the author's agreement. Legal force of...

Words: 12469 - Pages: 50

Free Essay

Abcd

...2010-04-13[11:16:39]: Logging started mode 01570 ---- LOG ROW INFO [0000010] ---- ---- LOG TABLE INFO [0000020] ---- ---- LOG DB INFO [0000040] ---- ---- LOG DBMS INFO [0000100] ---- ---- LOG SQL INFO [0000400] ---- ---- LOG DEBUG INFO [0001000] ---- Portingset mode 6.1c >>msql_attach_server -------------------------------------------------------------------------------- EFFECTIVE MSQL DRIVER SETTINGS -------------------------------------------------------------------------------- Common ~~~~~~ Level : 1 msql_dsn : msql_serverhost : (local) msql_init : 003000 000001:MSQL_ARRAY_FETCH : 0 000002:MSQL_ARRAY_INSERT : 0 000004:MSQL_EXPLAIN : 0 001000:not MSQL_USE_VARCHAR : 1 002000:MSQL_LEVEL1 : 1 004000:MSQL_PRINT_ERROR : 0 010000:not MSQL_LEVEL1 : 0 msql_use_cc : OFF msql_use_sp : ON msql_max_open_handles : 190 msql_max_ret_rows : 0 msql_max_arrsz : 1 msql_array_fetch : 0 msql_array_insert : 0 msql_log_warnings : 0 msql_lock_timeout : 10 (timeout after N seconds) msql_max_sql_buffer : 8000 msql_use_ffo : 1 msql_65_schema : 0 msql_odbc_prof_all : 0 msql_odbc_perf_stat : 0 msql_odbc_long_queries : 0 msql_odbc_query_timeout : 3000 -------------------------------------------------------------------------------- msql_alloc_henv id 8393960 Done. allocate_sql_buffer_area size 8000. msql_attach_server done... tbase_refresh D -1 ...

Words: 92865 - Pages: 372

Premium Essay

Lab 2 Nessus Ports Report Notes

...List of hosts | 172.30.0.1 | High Severity problem(s) found | | 172.30.0.2 | High Severity problem(s) found | | 172.30.0.200 | High Severity problem(s) found | | 172.30.0.4 | High Severity problem(s) found | | 172.30.0.8 | High Severity problem(s) found | | 172.30.0.9 | High Severity problem(s) found | | [^] Back | 172.30.0.1 | Scan Time Start time : | Sun May 25 13:18:40 2014 | End time : | Sun May 25 13:22:00 2014 | | | Number of vulnerabilities Open ports : | 9 | High : | 2 | Medium : | 0 | Low : | 19 | | | | Remote host information Operating System : | Linux Kernel 2.6 on Debian 6.0 (squeeze) | NetBIOS name : | | DNS name : | | | | | [^] Back to 172.30.0.1 | Port general (0/icmp) | [-/+] | Nessus Scan Information | Synopsis: Information about the Nessus scan. Description: This script displays, for each tested host, information about the scan itself: - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel Risk factor: None Solution: n/a Plugin output: Information about this scan : Nessus version : 4.2.2 (Build 9129) (Nessus 4.4.1 is available - consider upgrading) Plugin feed version : 201107120935 Type of plugin...

Words: 29098 - Pages: 117

Free Essay

Hard-Wired Control Design

...[pic] Computer Organization and Architecture Course design report Hare-wired Control Design 1. Objective a. To master the knowledge of Computer Organization and Arthitecture courses. To clearly understanding the working principles and interconnect of various modules of the computer system especially the hard-wired controller by making a comprehensive use of the knowledge. b. To learn the basic procecures and methods of using ISP technology to design and debug. To be familiar with the designing, simulating,and debugging tools for integrated development of software. And to experience the advantages of ISP technology from the traditional ones. c. To cultive the capability of independent work on science, and to obtain the experience of project design and assembling as well as debugging. 2.Equipment 1. TEC-4 system for COA experiments. 2. A dual trace oscilloscope. 3. A logical test pen. 4. An ispLSI1032 chip. 5. IspExpert of Lattice Co. Ltd. 3.Principles and Requirements The experiment is to design a hard-wired controller with an ispLSI1032 chip for the TEC-4 platform. The controller should perform five console instructions: KRD,KWE,KLD,KRR, nine machine instructions: ADD,SUB,MUL,AND,STA,LDA,JMP, JC,STP and the interrupts. Preparations: Timng Signal Generator: MF signal is generated by a crystal oscillator (frequency 1MHz), while producing T1, T2, T3, T4, W1, W2, W3, W4 timing signal, relationship as shown below. Where W1, W2...

Words: 2111 - Pages: 9

Premium Essay

At89C2051

...Features • Compatible with MCS®-51Products • 2K Bytes of Reprogrammable Flash Memory • • • • • • • • • • • • – Endurance: 10,000 Write/Erase Cycles 2.7V to 6V Operating Range Fully Static Operation: 0 Hz to 24 MHz Two-level Program Memory Lock 128 x 8-bit Internal RAM 15 Programmable I/O Lines Two 16-bit Timer/Counters Six Interrupt Sources Programmable Serial UART Channel Direct LED Drive Outputs On-chip Analog Comparator Low-power Idle and Power-down Modes Green (Pb/Halide-free) Packaging Option 8-bit Microcontroller with 2K Bytes Flash AT89C2051 1. Description The AT89C2051 is a low-voltage, high-performance CMOS 8-bit microcomputer with 2K bytes of Flash programmable and erasable read-only memory (PEROM). The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry-standard MCS-51 instruction set. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C2051 is a powerful microcomputer which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89C2051 provides the following standard features: 2K bytes of Flash, 128 bytes of RAM, 15 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, a precision analog comparator, on-chip oscillator and clock circuitry. In addition, the AT89C2051 is designed with static logic for operation down to zero frequency and supports two software selectable...

Words: 4390 - Pages: 18

Premium Essay

Subnetting Made Simple

...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...

Words: 7956 - Pages: 32

Free Essay

I Dont Know About This

...------------------------------------------------- Best in Quality! Every Resume is different. Get yours made by our expert writers ------------------------------------------------- Also refer to our Free – Resume Samples, Resume Templates , Cover Letter, Resignation Letter, Job Alerts ------------------------------------------------- ------------------------------------------------- XYZ ------------------------------------------------- E-Mail: xyz ~ Mobile: -00000000 / 00000000 Seeking entry level assignment in Application Development with an organization of high repute. ------------------------------------------------- PROFILE SUMMARY * B.E in Information Technology from XYZ Institute of Technology, Indore. * Proficient in finding and resolving malfunctions, using exceptional technical and communication skills. * Ability to express technical concepts clearly to people with no technical background. * Worked on academic project Restaurant Billing System and Staff Management System. * Adept in database MySQL and Programming language JAVA and Internet Applications. * Conversant with Bootstrap 3, Drupal, Wordpress, Adobe Dreamweaver and Big Data Handoop. * An effective communicator with excellent interpersonal, logical thinking & analytical abilities. ------------------------------------------------- ACADEMIC PROJECTS Project Title : Restaurant Billing System Organization : Tata International Ltd. Platform Used :...

Words: 369 - Pages: 2

Free Essay

Documents....

..._____________________________ ALWAYS ALBUM: MORE THAN LIFE ---------------------------------------------- Hillsongs United Tabbed By: Vhadz mORA www.vhadz101@yahoo.com Tuning: Standard Tuning INTRO: Bm-G-D-A (2x) Bm G D A e|--2----3------10-10---------*12--*9--*5---| B|---3----3---10------10---*12--------------| G|------------------------------------------| (2x) D|------------------------------------------| A|------------------------------------------| E|------------------------------------------| Verse: Bm Did You rise the sun for me? G D A Or paint a million stars that I might know Your majesty? Bm Is Your voice upon the wind? G D Is everything I've known marked with my Maker's A fingerprints? Pre-Chorus: G Bm ...

Words: 1764 - Pages: 8

Free Essay

Et2640 U4A1

...1.Find the CY and AC flags for each of the following: (a)MOV A, #3FHCY=0 No carry out from D7 ADD A, #45HAC=1 carry from D3 to D4 00111111 +01000101 10000100 (b)MOV A, #99HCY=0 No carry out from D7 ADD A, #58HAC=1 carry from D3 to D4 10011001 +01011000 11110001 (c)MOV A, #0FFHCY=1 SETB CAC=0 ADDC A, #00 SETB C-> CY=1 11111111 +CY 1 100000000 +00000000 100000000 (d)MOV A, #OFFHCY=1 ADD A, #1AC=1 11111111 + 1 100000000 (e)MOV A, #OFEHCY=1 SETB CAC=1 ADDC A, #01 11111110 + 1 11111111 + 1 100000000 (f)CLR CCY=1 MOV A, #0FFHAC=1 ADDC A, #01 ADDC A, #0 11111111 +00000001 100000000 +00000000 100000000 2. Write a program to add all the digits of your ID number and save the result in R3. The result must be in BCD. 3. Write a program to add the following numbers and save the result in R2, R3. The data is stored in on-chip ROM. ORG 250H MYDATA: DB 53, 94, 56, 92, 74, 65, 43, 23, 83 4. Modify Problem 3 to make the result in BCD. 6. State the steps that the SUBB instruction will go through for each of the following: 1. Take the 2’s complement of the subtrahend 2. Add it to the minuend 3. Invert the carry (a) 23H-12H 23H -> 00100011 00100011 12H -> 00010010 – 2’s complement+11101110 100010001 Step 3: CY=1 -> CF=0 Positive number 11H (b) 43H-53H 43H -> 01000011 01000011 53H -> 01010011 – 2’s complement+10101101  11110000 Step 3: CY=0 -> CF=1 Negative number -F0H (c) 99-99 99 -> 10011001 10011001 99 ->...

Words: 547 - Pages: 3

Premium Essay

Narnia

...Subnetting Made Simple IP Subnetting without Tables, Tools, or Tribulations Larry Newcomer The Pennsylvania State University York Campus Abstract Every networking professional should have a thorough understanding of TCP/IP subnetting. Subnetting can improve network performance by splitting up collision and broadcast domains. Subnets can reflect organizational structure and help support security policies. WAN links typically join different subnets. Subnets can define administrative units and hence support the structuring and delegation of administrative tasks. Unfortunately, mastering subnetting can pose difficulties for both professionals and students because of the binary mathematics that underlies the technology. While it is imperative to present subnetting concepts in terms of the underlying binary representation, most texts also present subnetting procedures in binary terms. Such an approach can make it difficult for students to learn how to actually carry out subnetting without tables or other reference materials, even when they understand the basic concepts. This paper presents a simple, alternative method for understanding and implementing subnetting without software, calculators, tables, or other aids. The only knowledge of binary arithmetic required is familiarity with the powers of 2 from 0 to 8 (2x for x = 0, 1, …, 8). With a little decimal arithmetic thrown in, the whole process is simple enough to be carried out mentally. This paper assumes the reader...

Words: 7956 - Pages: 32

Premium Essay

Term Paper: Ripe

...RiPE RiPE Official Guide Table of Contents: Injecting RiPE.................2 Selecting a Game.............2 Logging Packets...............3 Sending Packets...............3-4 Dynamic Packets..............5 Packet Blocking...............6 Packet Modification........6 Opcode Labeling..............7 Introduction to RiPEST...7 RiPEST Database.............8 Further Reading................8 1 RiPE Injecting RiPE: If you are using RiPE Launcher: Select the game or process that you want to inject into, and then click the "Inject" button. RiPE Launcher comes with RiPE. Make sure that RiPE Launcher is in the same folder / directory as RiPE.dll. If you are using Injector Gadget: Select the game or process that you want to inject into from the left. Add RiPE.dll to the DLLs to Inject list by browsing for it or dragging the .dll and dropping it into the DLLs to Inject box. After that is done, click the "Inject" button. Do NOT check "Cloak DLL." RiPE uses its own cloaking methods. Selecting a Game: After injecting, you should now see a "Game Selection" dialog. Select the game that you want to use RiPE for from the left, and the version from the right. Click on "Continue." You may additionally "Search for a Plugin" to search the RiPEST plugin database for other plugins. Plugins appear on the Game Selection menu just like any other game. 2 RiPE Logging Packets: To log packets, simply click "Hook Send" or "Hook Recv." Hook Send will...

Words: 1937 - Pages: 8

Free Essay

Conversions Binary, Decimal

...6. Hex to binary OXA3E9= ( 1010 0011 1110 1001 )2 7. Octal to hex 7268=0x( 1D6 ) 8. Base 9 to base 3 8479= ( 22 11 21 )3 9. Base 6 to base 3 1356= ( 2012 )3 10. Decimal to hex 86= 0x( 56 ) 11. Convert the following decimal number to sign and magnitude format (8 bits) -17=10010001 12. Convert the following decimal number to 1’s complement (8 bits) -17=11101110 13. Convert the following decimal number to 2’s complement (8 bits) -17=11101111 14. Convert the following decimal number to IEEE 754 ( 32 bits) 47.37510=0 1000 0100 0111 1011 0000 0000 0000 000 15. Convert the following IEEE 754 to decimal number 0 10000011 010001100000000 00000000= ( 20.75 ) 16. 4 bits unsigned number addition (Overflows or not?) 0101+1100=(1)0001 there is an over flow 17. 4 bits 1’s complement addition (Overflows or not?) 1101+1010= (1)0111 there is an overflow 18. 4 bits 1’s complement addition (Overflows or not?) 1100+1000 (1) 0100 there overflow 19. 4 bits 2’s complement addition (Overflows or not?) 1101+1011=(1)1000 not 20. 4 bits 2’s complement addition (Overflows or not?) 1100+1010(1)0110 over flow 21. 4 bits 1’s complement subtraction (Overflows or not?) 0101-1001=1011 not/ overflow occur convert the second number it absolute value 22. 4 bits 2’s complement subtraction (Overflows or not?) 1100-0101=0111 not/ overflow occurred 23. Unsigned binary subtraction ...

Words: 296 - Pages: 2

Premium Essay

Family Centered Care Essay

...an opportunity to make changes in the current system. In solving problems in complex system, the organization has to respond to the weak signals that the workers raise,. recognition of a problem by the workers is the first step in reducing the chances of doing harm. Someone must be accountable for the problem to be solved. Having a timely manner of notification to the person who’s responsible. Collaborative problem solving should be the goal. Enough time and resources 1 Roessner, J. (2011) Dignity and Respect (PFC 101). Institute for Healthcare Improvement, Open School. Retrieved from http://app.ihi.org/lms/coursedetailview.aspx?CourseGUID=8eb52137-21d7-4b30-afcd-fd781de6d6d5&CatalogGUID=4cc435f0-d43b-4381-84b8-899b35082938&LessonGUID=00000000-0000-0000-0000-000000000000 ...

Words: 423 - Pages: 2