1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
4 years ago
7

two examples of processes for data collection. What key principles are considered in these processes to ensure data accuracy?

Computers and Technology
1 answer:
aliya0001 [1]4 years ago
7 0

Answer:

Two examples of processes for data collection are:

In-person interviewing: This is a face-to-face method or process of data collection. It has a high rate of response and allows you to ask follow-up questions when the response of the interviewee is not clear.

Sample Surveys: In this method, a sample is selected from a large population and then a questionnaire is constructed and sent to the sample for them to give their feedback or response in line with the research problem.

Three Key Principles considered in these processes to ensure data accuracy are:

Completeness: This means that what was expected to be collected as data was what was collected. Completeness of data is a vital factor for data quality.

Consistency: There must be uniformity in the data collection process. Everyone involved in the data collection process must understand what is required of them.

Accuracy: The data must be free of errors

Explanation:

You might be interested in
Array elements must be ________ before a binary search can be performed.
Sladkaya [172]
In order.
You have to be able to see if its on the left or right side of the midpoint
7 0
3 years ago
You are seeking a way to store computer files so you have backup copies anywhere you go.? Which one of the secondary storage typ
garri49 [273]
If you want to know the right answer you should attach an options to choose. Anyway I think the right answer is USB flash-drive. It's possible to create recovery on usb and store any type of files.
3 0
3 years ago
A _______ is a piece of computer hardware used for the modulation and demodulation of data between digital and analog formats.
mario62 [17]
'Modem'. A hardware that changes analogy to digital and vice versa.
5 0
3 years ago
Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
SVEN [57.7K]

Answer:

True

Explanation:

Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False

Authorization is a set of rights defined for a subject and an object.

Authorization is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorization is normally preceded by authentication for user identity verification.

4 0
3 years ago
Match the part of the browser window to the correct description.
hodyreva [135]

Answer:

1. Tabs: allows you to drag the window to a new location

Explanation: Tab is the key that is used to switch between different windows or websites that are opened at a time. This can be done by pressing Ctrl+Tab

2. Status Bar: displays whether the Web page is secure or not

Explanation: Status bar is used to show the status or information related to that page. Like Information related safety precaution.

3. Title Bar: allows you to quickly move between different Web sites

Explanation: Title bar consist of the name of different websites that are open at particular time. This shows at the top of the browser. We can quickly move on different websites using title of website.

4. Bookmarks: save Web addresses so you can return to them quickly

Explanation: Bookmarks are the pages that we save in bookmark menu, to re-open the page whenever its needed.

4 0
3 years ago
Other questions:
  • Which of the following are advantages of a local area network, as opposed to a wide area network? select three options
    15·1 answer
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • C programming: loading a dictionary into a trie data structure. Why am I segfaulting?
    8·1 answer
  • You have a brand-new monitor and you want to make sure you are getting the most out of it. For this reason, you decide to alloca
    13·1 answer
  • You can perform an in-place upgrade to Windows 7 from both Windows XP and Windows Vista
    10·1 answer
  • Resumen sobres el correo electrónico​
    6·1 answer
  • SOMEONE HELP PLEASE ​
    5·1 answer
  • How do you create a myBlueprint account
    11·2 answers
  • T<br> N<br> O<br> ?<br> You can insert only the row<br> only to<br> True or false
    7·2 answers
  • Sự ra đời của thương mại điện tử có tác động như thế nào đến việc quảng cáo và Marketing sản phẩm
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!