1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
15

What research method in sociology is also referred as fieldwork

Computers and Technology
1 answer:
Tanya [424]3 years ago
8 0
The answer is Field research  
You might be interested in
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
3. What do you need to do before you can sort and filter data in a database?
Digiron [165]

3. format the table

4. idk

5 0
3 years ago
Sharon wants to name her website sharonworld.com. What should she do next? A. begin searching for images to make her website loo
Goshia [24]

purchase the domain name

3 0
3 years ago
Read 2 more answers
Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
____ [38]
Because of the capitalization; when talking about computer science and programming things have to be very tedious and specific. <span />
5 0
3 years ago
Write a Java code statement for each of following:
Naddik [55]

Answer:

double decimal1, decimal2;

int whole;

Explanation:

Required

Declare 2 decimals and 1 int.

The syntax to declare a variable is:

<em>data-type variable-name;</em>

To declare decimal, we simply make use of double or float data types.

So, we have:

double decimal1, decimal2; ----> for the decimal variables

And

int whole; ---- for the whole number

6 0
3 years ago
Other questions:
  • Pressing the Ctrl+Home keys moves the insertion point to the
    9·2 answers
  • How long does the Splunk search job remain active
    5·1 answer
  • A mobile base station (BS) in an urban environment has a power measurement of 15 µW at 175 m. If the propagation follows an inve
    9·1 answer
  • Array is special variable that can handle more than one value.
    6·1 answer
  • When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,
    15·1 answer
  • There will be 10 numbers stored contiguously in the computer at location x 7000 . Write a complete LC-3 program, starting at loc
    14·2 answers
  • List three ways security could be improved for taking the prepared deposit monies to the bank?​
    11·1 answer
  • Name of the electrical tool and their classification
    10·1 answer
  • Does any body know how to bypass easy anti cheat on crossout
    7·1 answer
  • Which characters are used in hump notion?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!