Constant voltage sources, Computer Engineering

Constant Voltage Sources

An ideal constant voltage source maintains a given voltage across its load regardless of the current drawn from it.Most 'every-day' power supplies are intended to be constant voltage supplies - e.g batteries, ac mains etc.

791_constant voltage source.png

Posted Date: 8/21/2012 1:28:49 AM | Location : United States







Related Discussions:- Constant voltage sources, Assignment Help, Ask Question on Constant voltage sources, Get Answer, Expert's Help, Constant voltage sources Discussions

Write discussion on Constant voltage sources
Your posts are moderated
Related Questions
Q. Rules for calling assembly subroutines from? The rules for calling assembly subroutines from C are: (i)  Memory model: The calling program and called assembly programs sh

Illustrate how 74147 series TTL can be used as a decimal-to-BCD encoder. Ans. Available IC in 74 series is 74147 that is a priority encoder. Such IC has active low inp

Fuzzy logic is a form of various-valued logic; it deals with reasoning that is approximate rather than fixed & exact. In contrast with traditional logic theory, where binary sets h

Q. In PRAM model steps required for executing an algorithm? Subsequent steps are performed by a PRAM model whenever executing an algorithm: i) Read phase: First the N proc

Vector-Vector Instructions In this category, vector operands are fetched from vector register and accumulated in another vector register. These instructions are indicated with

how to find the type of cohesion in a module

Q. Illustrate the working of FLIP-FLOPS? A flip-flop is a binary cell that stores 1-bit of information. It itself is a sequential circuit. We know that flip-flop can change its

Task: Sets and bags In mathematics, the notion of multiset (or bag) is a generalisation of the notion of set. A bag is a special kind of container in which the items may be

What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi

In a multicomputer system the computational load amid different processors should be balanced.  To pass information between different nodes message passing technique is used. The p