1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
2 years ago
4

For which research method is the primary data source information gained from interviews and questionnaires?

Computers and Technology
1 answer:
andreev551 [17]2 years ago
6 0

survey research method

<h3>what is the survey in primary data source information?</h3>
  • Survey research is commonly used to generate primary data sources.
  • To collect primary data, a variety of survey techniques such as interviews (e.g., face-to-face, telephone, e-mail, fax) or self-administered questionnaires can be used.

To learn more about it, refer

to brainly.com/question/25458754

#SPJ4

You might be interested in
7) through: (0, 4) and (-1,0)​
Andreyy89

Answer:

its 5

Explanation:

7 0
3 years ago
Interactive sites were usually is right about important topics and comments to a threaded discussion are called
iren2701 [21]
The answer to this question is:

Interactive sites were usually is right about important topics and comments to a threaded discussion are called"Blogs"

Hoped This Helped, Euniceortiz13
Your Welcome :)
8 0
3 years ago
Write an expression to print each price in stock_prices. Sample output with inputs: 34.62 76.30 85.05
Lana71 [14]

Answer:

Here is the Python program:

stock_prices = input().split() #to take input and splits it into a list

for price in stock_prices: #iterates through stock_prices

   print("$",price) #prints each value of stock_prices with a dollar sign

Explanation:

The program is well explained in the attached comments. I will explain the logic of the program with the help of an example:

Suppose the user enters the following input as stock_prices values

34.62 76.30 85.05

input() method is used to take input from user

split() method is used to split or break this input string and returns a list of strings as:

['34.62', '76.30', '85.05']    

Now the statement for price in stock_prices: iterates through each item of the list and print("$",price) prints each value of list with a dollar sign on the output screen as:

$ 34.62                                                                                                            

$ 76.30                                                                                                            

$ 85.05    

4 0
4 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Self-disclosure is most likely to occur _____________.a.
Feliz [49]

The answer is..

C.  During one-on-one conversations

4 0
3 years ago
Read 2 more answers
Other questions:
  • Assign to avg_owls the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4 3
    7·1 answer
  • What is the function of the Status bar in Outlook 2010?
    9·1 answer
  • Connie decided that her paper should be organized in the order in which the events happened. What type of organizational method
    15·1 answer
  • 2. How do web bugs invade a person’s privacy?
    10·2 answers
  • What type of hardward drive not require defragging??
    11·1 answer
  • What are the benefits of transferable skills check all the boxes that apply
    6·2 answers
  • Seven Features of computer aids design software
    6·1 answer
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    14·1 answer
  • Which of the following is NOT a reason to use cryptography?
    5·2 answers
  • given the variables temperature and humidity, write an expression that evaluates to true if and only if the temperature is great
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!