1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
15

What research method in sociology is also referred as fieldwork

Computers and Technology
1 answer:
Tanya [424]3 years ago
8 0
The answer is Field research  
You might be interested in
This whole page needs to be done please help?
ira [324]

Answer:

F, T, F

C. A. C. D. B

that is just it

brainliest please ;)

6 0
3 years ago
In what situations other than developing software might the process of analysis, design, development, test, deployment, and main
forsale [732]

In Systems development  or  traditional waterfall approach will the process of analysis, design, development, test, deployment, and maintenance be a useful approach.

<h3>What is software development?</h3>

Software development is known to be a term that connote the composition  of computer science works made for the process of developing , designing, and aiding software.

Note that In Systems development  or  traditional waterfall approach will the process of analysis, design, development, test, deployment, and maintenance be a useful approach. as it also uses the dteps listed above.

Learn more about software from

brainly.com/question/1538272

#SPJ1

7 0
2 years ago
Why is UDP less reliable than TCP?
borishaifa [10]

Answer:

a.) UDP does not include data reassembly.

7 0
3 years ago
Read 2 more answers
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
Write a MATLAB script m-file to compute the ISS given an array of 6 AIS scores, which represent the most severe injuries to each
Dmitrij [34]

Answer:

The Matlab code is as given in the explanation, paste the code in the new script file, save it and run.

Explanation:

The code is as follows

Code:

<em>%% Initialization of the code</em>

<em>% The code takes an array of six AIS scores of the form [AIS1 AIS2 AIS3</em>

<em>% AIS4 AIS5 AIS6] of order 1x6.</em>

<em>AIS=input('Please enter the AIS array of the form [AIS1 AIS2 AIS3 AIS4 AIS5 AIS6]');%taking input of the array</em>

<em>AISs=sort(AIS,'descend');%sorting the array in the descending order</em>

<em>iss=(AISs(1,1)^2)+(AISs(1,2)^2)+(AISs(1,3)^2);%Calculating the ISS</em>

<em>disp(['The injury severity score (ISS) for the entered array is ', num2str(iss)])%Displaying the output</em>

Output:

<u><em>Please enter the AIS array of the form [AIS1 AIS2 AIS3 AIS4 AIS5 AIS6][3 0 4 5 3 0];</em></u>

<u><em>The injury severity score (ISS) for the entered array is 50</em></u>

<u><em /></u>

4 0
3 years ago
Other questions:
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • All ofthe following are correct EXCEPT one option when it comes towriting disappointing news letters. Identify theexception.
    6·1 answer
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • What are pixels? A. Objects that are part of a particle system B. Tiny colored dots that make up images and text on a computer s
    9·1 answer
  • What are the two types of computer keyboards and how are they different?
    6·2 answers
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • Write an application that allows a user to input the height and width of a rectangle. It should output the area and perimeter of
    10·1 answer
  • High-level languages must be translated into machine language before they can be executed. _________________________
    10·1 answer
  • Consider a pipelined processor with just one level of cache. assume that in the absence of memory delays, the baseline cpi of th
    13·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!