Browse Definitions :
Definition

watt-hour (Wh)

The watt-hour (symbolized Wh) is a unit of energy equivalent to one watt (1 W) of power expended for one hour (1 h) of time. The watt-hour is not a standard unit in any formal system, but it is commonly used in electrical applications.

An energy expenditure of 1 Wh represents 3600 joules (3.600 x 103 J). To obtain joules when watt-hours are known, multiply by 3.600 x 103. To obtain watt-hours when joules are known, multiply by 2.778 x 10-4.

In general, energy (E) is equivalent to power (P) multiplied by time (t). To determine E in watt-hours, P must be expressed in watts and t must be expressed in hours. Suppose a 60-W bulb burns for 3 h. Then P = 60 and t = 3, so the energy E in watt-hours is:

E = Pt = 60 x 3 = 180 Wh

If P and t are not specified in watts and hours respectively, then they must be converted to those units before determining E in watt-hours.

The watt-hour is rarely used to express energy in any form other than electrical. A quantity of gasoline, oil, or coal contains potential energy that is liberated when the fuel is burned. The heat energy resulting from combustion of such fuels is usually expressed in joules according to the International System of Units (SI) or in British thermal units (Btu) according to the foot-pound-second (fps) or English system. If this energy is used to operate an electric generator, the output of the generator over a certain period of time can be expressed in watt-hours.

Compare kilowatt-hour. Also see energy, joule, International System of Units (SI), and Table of Physical Units.

This was last updated in September 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close