1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
5

The primary reason descriptive/correlational research cannot determine conclusively that variables have a cause-and-effect relat

ionship is because in conducting research
Social Studies
1 answer:
WARRIOR [948]3 years ago
4 0
The researcher can't control occasions or control factors. A correlational report is a quantitative strategy for the look into in which you have at least 2 quantitative factors from a similar gathering of subjects, and you are attempting to decide whether there is a connection between the 2 factors.
You might be interested in
Researchers confirm a hypothesis they have developed through experimentation after conducting several trial experiments upon the
Aneli [31]

The hypothesis becomes a theory.

From being a suggested explanation (for an observable phenomena), hypothesis develops into a scientific theory.  Hypothesis that is tested or undergone scientific methods  and experimental research move on to become a scientific theory. Scientific theories have consistent with experimental results and must have predictive power.

5 0
3 years ago
The court may convict you of DUI in addition to the penalties imposed under the non-criminal "zero tolerance" law that makes it
lakkis [162]

Answer:0.01%

Explanation: Driving Under the Influence i fers driving or operating a motor vehicle under the influence of alcohol or drug to the extent of rendering the driver unsafe to drive a vehicle. Drinking alcohol that raises the blood alcohol concentration level above 0.01% reflects a flushed, visible red appearance on the face and impaired judgement and muscle coordination is considered illegal for persons under the age of 21. Hence, the repercaution could include mandatory jail term, substantial fees, revocation of driver's license and suspension

7 0
3 years ago
Wagwan ............................<br> only answer if u wat it means
Citrus2011 [14]

Answer:

wagwan (Jamaican, MLE) Greeting equivalent to what's up or what's happening. Usage notes. It is used through out the Jamaican diaspora, including in hip-hop culture and by reggae music fans. The standard response is nagwan / nuttin nah gwaan (“ nothing is going on ”).

hope that helps

6 0
3 years ago
What best describes the Incan social class structure?
KatRina [158]

Answer:

Inca

Explanation:

Inca society was based on a strictly organized class structure. There were three broad classes: The Emperor and his immediate family, nobles, and commoners. Throughout Inca society, people who were “Inca by blood” – those whose families were originally from Cuzco – held higher status than non-Incas.

Mark this brainliest and follow and like

5 0
2 years ago
Chad signs dolly’s name, without her authorization, to the back of her paycheck, which was issued by eastside market. this is:__
olchik [2.2K]

Chad signs dolly’s call, without her authorization, to the return of her paycheck, which became issued through the eastside marketplace. this is ​a forgery.

Authorization is the system of giving a person the capability to get the right of entry to a useful resource. Of path, this definition may also sound obscure, but many situations in real existence can help illustrate what authorization approach so that you can follow those standards to pc structures. an excellent example is house ownership.

Authorization is a system by means in which a server determines if the consumer has permission to apply a resource or get admission to a file. Authorization is typically coupled with authentication in order that the server has a few concepts of who the patron is that is inquiring to get entry. authorization is a method thru which the running device determines that a procedure has the proper to execute in this gadget. The most commonplace form of this management is the user name, which we are all acquainted with when we go online to a computer. the second form of running gadget safety is authentication.

There are 4 varieties of Authorization – API keys, basic Auth, HMAC, and OAuth. web improvement, programming languages, software program trying out & others.

Authorization is required to deal with sensitive records and belongings. with none of them, you are keeping facts susceptible to data breaches and unauthorized get the right of entry.

Learn more about Authorization here:

brainly.com/question/7088084

#SPJ4

7 0
2 years ago
Other questions:
  • How is market economy linked to free enterprise ​
    5·1 answer
  • On a map, this tool would help explain symbols, colors, and lines on a map.
    13·1 answer
  • PLEASE HELP MEEEEEEEEEEEEEEE!!!!!!!!!!!!!!!!!!!!!!!!!!!
    9·2 answers
  • HURRRY PLS The construction of__ is an efficient way of making more electricity to benefit humans.
    7·2 answers
  • Jonah and Eli are having a conversation about how the brain works. Jonah maintains that the brain must be much more active when
    6·1 answer
  • Juvenile involvement in violent crime select one:
    13·1 answer
  • What two nations emerged as superpowers after world war 11
    9·1 answer
  • Paano magkaugnay ang demand at suplay epektibo ba itong ipinakita ng gumuhit ng editorial cartoon?​
    7·1 answer
  • .<br>demanded from British government in 1985 to allow elected members in the<br>legislature​
    14·1 answer
  • Self-administration of nicotine in animal models is most likely suppressed by means of:____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!