Explain with example of functional requirements of protection relay in terms reliability, selectivity, sensitivity
1883Can anyone explain, How will get positive to ground and negative to ground reference voltage in dc system
1 2307-200mmwc to 500mmwc range transmitter have there 4mA is -200 and 20mA is 500.what is the range in 12mA?
5 5753Please tell me any one, how many quantity concrete paver block fixing perday ( 8hours) per mason??
1687Post New NCC Interview Questions
What is the difference between delegates and superdelegates?
What are multiple inheritances (virtual inheritance)? What are its advantages and disadvantages?
What are Grunt and Gulp?
Can hashmap store null values?
What are the different types of bean injections?
How does django session work?
Is magento written in php?
How do I link to a specific tab in excel?
How do you delete a column?
How do I link an entire row in excel?
If you had a tablespace, test_tablespace, which consists of three files:test01.dbf, test02.dbf, and test03.dbf, and someone accidentally used the unix command"rm" to delete the file test02.dbf, what else would you need in order to recover all the data thatwas present in test_tablespace at the time that test02.dbf was deleted?
what is the difference between surge protection capacitor and surge arrestor
Which is considered more secured wordpress.com or wordpress.org?
What is config file in codeigniter?
related to personal A/c 1000rupes ram deposite in bank own account