What is the effect on in Zone and out zone fault if Phase side CT is Vk/2<30 mA and Neutral side is CT is Vk/4<30 mA for Transformer REF protection
3867What is effect on in zone and out zone fault if CT chosen for phase side is Vk/2<5mA and Neutral side is Vk/2<15mA on REF protection of Transformer
2441What is the basis for selecting Vk/2 or Vk/4 for REF and Differential protection of Transformer and What is the significance of magnetising current
2457Post New ABB Interview Questions
How can I boldly face the interview? Request:I am eagerly waiting for your replay.
What is the difference between an orm and an odm?
When we create a pf and did not fill up maint parameter, then by default which access path will the system take & why?
What is struct and explain its purpose?
What are the skills required to become actuarial?
Can I learn javascript without html?
What is an interface class? Give one example of it
Which class is used for basic pagination?
WHAT IS DIFFERENCE BETWEEN MANUAL CONTROL AND MAGNETIC CONTROL AND STATE ITS ADVANTAGE /DISADVANTAGE
What are the tools available to compare the telemarketing result with mail shots? : insurance cold calling
How do you maintain promotions in sap is retail?
Do you explain who can buy a policy?
Tell me what hyperlinks available in peoplebooks? Some options with different hyperlinks not available in peoplebooks, select the correct one?
Explain how to use simpledb with amazon?
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]