Search results
Results from the WOW.Com Content Network
The 20 A plug has a blade rotated 90° (opposite blade from what would be the "line" blade on a 2-15 or 5-15 plug. This prevents accidental insertion of plugs into outlets that use different voltages), and the 6-20R receptacle has a T-shaped hole to accept both 6-15P and 6-20P plugs (similar to the 5-20R receptacle accepting 5-15P and 5-20P plugs).
The normal technical term (in both British and International English) for an AC power socket is socket-outlet, [4] but in non-technical common use a number of other terms are used. In British English the general term is socket, but there are numerous common alternatives, including power point, [5] plug socket, [6] wall socket, [7] and wall plug ...
A Leviton GFCI "Decora" socket in a North American kitchen. Local electrical code requires tamper-resistant socket in homes, and requires a GFCI for socket within 1 metre of a sink. The T-slot indicates this device is rated 20 A and can take either a NEMA 5-15 or a NEMA 5-20 plug, though the latter type is rare on household appliances.
"Switched socket-outlets and connectors with or without interlock" applies to self-contained products that combine within a single enclosure, a socket-outlet or connector according to IEC 60309-1 or IEC 60309-2 and a switching device, with a rated operating voltage not exceeding 1000 VDC or VAC and 500 Hz, and a rated current not exceeding 800 A.
Five outlets, plus another four USB ports means your days searching for a place to plug in are over. One of our most popular items of 2024, AOL readers have purchased thousands of these $10 surge ...
IEC 60906-1-plug. IEC 60906-1 (IEC designation "Type N") [1] is an international standard designed "to provide a standard for a safe, compact and practical 16 A 250 V AC system of plugs and socket-outlets that could be accepted by many countries as their national standard, even if not in the near future."
One of our most popular items of 2024, AOL readers have purchased thousands of these $10 surge protectors — here's why
Tamperproofing is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term "tamperproof" is a misnomer unless some limitations on the tampering party's resources is explicit or assumed.