1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
4 years ago
11

Ron wants to install an energy efficient and long lasting device for lighting in his new home. Which device should he use?

Computers and Technology
2 answers:
Virty [35]4 years ago
8 0

Answer:

Led Tube Lights

Explanation:

Tubular lamps are commonly used in spaces where lighting is needed for long periods of time. Therefore, one of the most important factors for store managers when choosing the most appropriate type of lamp is their consumption.

The difference between LED tubes and fluorescent tubes is significant, although not apparent when comparing the consumption of only one lamp. However, when making the calculation considering the total number of them, the energy consumption of fluorescent lights can even double.

Other benefits of LED tube

  • Turn on instantly; does not require reactors, consuming less energy;
  • Unlike fluorescent, it does not emit ultraviolet and infrared rays;
  • Can have up to 50,000 hours of service life, reducing the need for maintenance;
  • It is made of sturdy material and can withstand shock and vibration;
  • Its intensity can be controlled;
  • Opens up the possibility of implementing sensors.
olga2289 [7]4 years ago
4 0
Ron will most likely want to buy tube lights since that is a good energy saver.
You might be interested in
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
Write some positive and negative impacts of computer in our daily life​
8090 [49]
Positive impacts are
1. Communicating with people
2. Daily update of what going on in the world
3. learn new things
Negative impacts are
1. Viruses
2. Private information shared
3. Less face to face conversations
3 0
3 years ago
Which wildcard characters will return a single character when using the Find dialog box?
scoray [572]

Answer:

?

Explanation:

It is the "?" character. When we type in the ? in the regular expression, then it means that it will be replaced by a single character. And when we type *, then we mean there can be multiple, and any number of characters. And this is what is meant by these two wildcard characters. Hence, the correct option here is ?.

Example: ?op can be top, pop, etc, and we can see here that, ? is replaced by only one character each time.

7 0
3 years ago
Read 2 more answers
Sorting Records in a Form
Naya [18.7K]

Answer:

1. Open the form in the standard form view.

2. Put the cursor in the field to use for sorting.

3. Open the Home tab

4. In the Sort & Filter group, click ascending or descending

Explanation:

Took the test :)

7 0
3 years ago
Does a wizard function allow the user to enter or modify data in the records? select yes or no
mojhsa [17]
Yes wizard function allows you to modify records

4 0
3 years ago
Other questions:
  • The photo-sharing site Instagram owed a good deal of its success to filters. What are filters?
    11·2 answers
  • What are three methods of sustainable farming and describe each.
    9·1 answer
  • Does the following program represent an algorithm in the strict sense? Why or why not? Count=0 while count (count ! =5): count =
    13·1 answer
  • It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin
    8·1 answer
  • Which was the first arcade game that was adapted for mobile phones ????
    13·1 answer
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • In IDLE, which symbols are used for the prompt? <br>*** <br>&lt;&lt;&lt;<br> &gt;&gt;&gt;<br> ---​
    8·1 answer
  • You have a large text file of people. Each person is represented by one line in the text file. The line starts with their ID num
    5·1 answer
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
  • The agency that started ARPANET was looking for
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!