1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
6

Florescent lights tend to emit less of what color?

Computers and Technology
1 answer:
Olin [163]3 years ago
4 0
I believe it emits more yellow, it can even be blue or green 
You might be interested in
1. Briefly explain the concept of signature of a function, in a function declaration. What signature components are crucial for
Irina18 [472]

Answer:

Function signature can be defined as a combined term used to refer to the function name, function return type, no of arguments , type of arguments.

Explanation:

The signature of function is seen as a combined term used to refer to the function name, function return type, number of arguments , type of arguments.

When overloaded functions is been defined, they are different in numbet of arguments or type of argument passed.

To understand this better refer to the program code below.

C++ code.

#include <iostream>

using namespace std;

int multiply(int a, int b)

{

cout << a*b <<endl;

return 0;

}

int multiply(int a, int b, int c)

{

cout << a*b*c <<endl;

return 0;

}

int main()

{

//function with two arguments passed

multiply(3, 50);

//function with three arguments passed . It is different in number of arguments passed. Thus here function signature is different

multiply(4, 20, 10);

}

6 0
3 years ago
Which feature of spreadsheet software will make it easier for you to find the average number of calls made per hour for each emp
max2010maxim [7]

Answer:

It's formula and functions

Explanation:

6 0
3 years ago
1. provide at least 3 properties and 3 methods of the object computer.
ValentinkaMS [17]

Answer:

The answers to these questions are given below in the explanation section.

Explanation:

The following are 3 properties and 3 methods of the object computer.

Solution

Properties:

  1. computer name;
  2. computer model;
  3. computer color;
  4. computer manufacturer

Methods:

  1. Turn on/off
  2. Do Wordprocessing
  3. Connect Keyboard/Mouse
  4. Charging
  5. Play sound

The following are 3 properties and 3 methods of the object computer.

Properties:

  1. Car Model;
  2. Car Manufacturer;
  3. Car Color

Methods:

  1. Car Run (Speed)
  2. Change Gear
  3. Open/Close Door
  4. Turn on/off

7 0
3 years ago
If you want to present slides to fellow students or co-workers, which productivity software should you use to create them?
slamgirl [31]
Microsoft powerpoint? i think thats what this is asking
4 0
3 years ago
Read 2 more answers
Using the simple alphabet code below, you will decode and encode the message. Write the Full
gladu [14]

Answer:

acefghijlmb2d4k1113589136510waynopqrtuvx2261415161718202122232425

Explanation:

6 0
3 years ago
Other questions:
  • An effectively distributed resume will get an interview
    12·2 answers
  • What are five features of word 2016 you would use to capture the attention of the target audience? Defend you decisions
    9·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle
    10·1 answer
  • A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f
    8·1 answer
  • You are creating a presentation and you have come to the last slide. you still have more information to add. what should you do?
    10·2 answers
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • Pls help I will give lots of points
    9·1 answer
  • What refers to a collection of small sections of code that are stored together to solve many everyday programs?
    11·2 answers
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!