A network consists of several inductances connected in parallel. The equivalent inductance of the network is given by

(A) the sum of the individual inductances.

(B) the reciprocal of the sum of the individual inductances.

(C) the sum of the reciprocals of individual inductances.

(D) the reciprocal of the sum of reciprocals of individual inductances.

1 Answer

Answer :

A network consists of several inductances connected in parallel. The equivalent inductance of the network is given by the reciprocal of the sum of reciprocals of individual inductances.

Related questions

Description : N resistors of each of resistance R when connected in series offer an equivalent resistance of 50 ohm and when reconnected in parallel the effective resistance is 2 ohm the value of R is

Last Answer : 25 ohms

Description : Norton’s theorem states that a complex network connected to a load can be replaced with an equivalent impedance (A) in series with a current source (B) in parallel with a voltage source (C) in series with a voltage source (D) in parallel with a current source

Last Answer : in parallel qith current source

Description : A network that consists of at least a voltage source or current source is called A) Active network B) Ideal network C) Sourced network D) Outsourced network

Last Answer : A network that consists of at least a voltage source or current source is called Active network

Description : The equivalent inductance of two coils with series opposing flux having inductances 7H and 2H with a mutual inductance of 1H. a) 10 b) 7 c) 11 d) 13

Last Answer : b) 7

Description : The equivalent inductances of two coils 2H and 5H in series aiding flux with mutual inductance of 3H is a) 10 b) 30 c) 1 d) 13

Last Answer : d) 13

Description : A closed path made by several branches of the network is known as?

Last Answer : A closed path made by several branches of the network is known as loop.

Description : Two unpedauces given by Z1 = 10 + j5 and Z2 = 8 + j9 are joined in parallel and connected across a voltage of V = 200 + j0. Calculate the circuit current and branch currents. Draw the vector diagram.

Last Answer : Solution: Given, Z1=10+j5, Z2=8+j9, V=200+j0

Description : Find the Norton equivalent resistance for the network shown in Fig No. 2

Last Answer : Solution: To find Norton’s equivalent resistance removing voltage source and current source. Voltage source is replaced by short circuit and current source is replaced by open circuit so, we get circuit as

Description : An a.c series circuit has resistance of 10ohm, inductance of 0.1H and capacitance of 10µf, voltage applied to circuit is 200V. find (i) Resonant frequency (ii) Current at resonance (iii) Power at resonance 

Last Answer : Solution: For RLC series circuit

Description : Calculate the mutual inductance of two tightly coupled coils with inductances 49H and 9H. a) 21 b) 58 c) 40 d) 49/9

Last Answer : a) 21

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : (i) Bilateral Network (ii) Node (iii) Loop (iv) Branch

Last Answer : (i) Bilateral Network: If the characteristic of network (response or behavior) is independent of the direction of current through its elements in it, then the network is called as a bilateral network e. ... A part of an electric network which lies between two junctions or nodes is known as branch. 

Last Answer : Any electric network may be defined as a combination of a number of electric elements.

Description : What do you mean by bilateral network and unilateral network?

Last Answer : Bilateral Network: An element whose response is independent of direction of current flowing through it is called Bilateral element and the network, which contains only bilateral elements, is called ... response depends on the direction of current flowing through it, is called unilateral network.

Description :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be A) 3 B) 2 C) 4 D) 5 

Last Answer :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be 3 

Description : A passive network

Last Answer : A passive network has no emf source.

Description : A Two-Port Network is said to be symmetrical when the following equalities hold good (A) Z11 = Z22 and Z12 = Z21 (B) Z11 = Z22 (C) Y12 = Y21 (D) Y11 = Y22 and Y12 = Y21

Last Answer : A Two-Port Network is said to be symmetrical when the following equalities hold good Z11 = Z22

Description : Explain the suitable example to convert a practical current source into equivalent voltage source.

Last Answer : The open- circuit voltage across terminals A and B is Voc = drop across R  =5x2=10V Hence, voltage source has a voltage of 10V and the same resistance of 2Ω

Description : If all devices are connected to a central hub, then topology is called

Last Answer : C) Star Topology

Description : A series combination of resistance 100 ohm and capacitance 50µf is connected in series to a 230 V, 50HZ supply. Calculate (i) Capacitive reactance (ii) Current (iii) Power factor (iv) Power consumed 

Last Answer : For RC series circuit

Description : Compare series and parallel resonance on the basis of (i) Resonating frequency (ii) Impedance (iii) Current (iv) Magnification

Last Answer : S. No . Parameter Series Circuit Parallel Circuit 1 Resonating frequency 2 Impedance Minimum, Z = R Maximum, Z = L/CR 3 Current Maximum, I ... , I = V/(L/CR)  4 Magnification Voltage magnification takes place Current magnification takes place

Description : Windows 7 asks for network password when trying to share a folder.

Last Answer : answer:“I didn’t set one” Try setting a PW on the master entrance, then try what you are doing again.

Description : Sending messages to devices on my network.

Last Answer : What kind of “messages” were you looking to send? Even though they might all be connected to a single wireless network, they still each have their own protocol for “messages”.

Description : What could be wrong with my network or ISP?

Last Answer : Check for a trojan or root kit virus. When your system is being used as a bot and busily sending email for a spammer it does tend to slow down.

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ............ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above

Last Answer : C) Subnet number and host number.

Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Which is not the Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : C) i-c, ii-a, iii-d, iv-b

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : Europeans Registry for Internet Numbers (ERIN)

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : 2.address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D

Last Answer : A) Class A

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B

Last Answer : D) A and B

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh

Last Answer : Mesh

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.