1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
4 years ago
15

Which technique involves repeating the essence of an earlier research study with different participants and in different circums

tances? Your answer:
Computers and Technology
1 answer:
frez [133]4 years ago
3 0

Answer: Replication

Explanation:

 Replication is the technique in which the data is store in one and more node and site. It basically improve the availability of the data. Replication technique basically involve in the repeating essence of the earlier researches study in the different circumstances.

The replication of database basically found in many different applications which connect the primary and secondary storage location. This technique is valuable for the testing and operational report.

You might be interested in
6.12 Nested Increments Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' b
Nina [5.8K]

Answer:

trees_to_cut = int(input("How many trees do you wants to cut? "))

print(str(trees_to_cut) + " tree(s) will be cut.")

for i in range(trees_to_cut):

   print("Tree #" + str(i))

   

   rings = int(input("How many rings in tree " + str(i) + "? "))

   print("There are " + str(rings) + " ring(s) in this tree.")

   for j in range(rings):

       print("Celebrating tree #" + str(i) + "'s " + str(j+1) + ". birthday.")

Explanation:

*The code is in Python.

Ask the user to enter the number of trees to cut

Print this number

Create a for loop that iterates for each tree

Inside the loop:

Print the tree number. Ask the user to enter the number of rings. Print the number of rings. Create another for loop that iterates for each ring. Inside the inner loop, print the celebrating message for each birthday of the tree

7 0
4 years ago
I try to make an account so I can have some help, but it always says "We’re sorry, but we are not able to complete your registra
Romashka-Z-Leto [24]

Answer:

that keeps happening to me too i sent them a email and they said they are trying to fix it

8 0
3 years ago
Which is the correct option?
Murljashka [212]

Answer:

C

Explanation:

Key logging is when a hacker can track every key u have clicked.

3 0
3 years ago
How many generations of computer languages have there been since the middle of the 20th century?
Anuta_ua [19.1K]
4. https://en.m.wikibooks.org/wiki/A-level_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Fundamentals_of_Computer_Systems/Generations_of_programming_language
3 0
3 years ago
Individual mental blocks may cause option
Bond [772]

B. negative attitude option

3 0
3 years ago
Other questions:
  • You can increase your efficiency by using your e-mail program's spell checker because it eliminates the need for you to proofrea
    11·1 answer
  • What is a motherboard?
    7·2 answers
  • Jason is computer professional who has access to sensitive information. He shares this information with another organization in
    7·2 answers
  • Can a msi b450 tomahawk motherboard fit into a darkflash dlm21 mesh micro atx tower
    13·1 answer
  • Which of the following are true about the PUSH instruction?
    9·1 answer
  • One interesting application of computers is to display graphs and bar charts. Write an application that reads five numbers betwe
    5·1 answer
  • To use an ArrayList in your program, you must import:1. the java.collections package2. the java.awt package3. Nothing; the class
    6·1 answer
  • IPv6 enables hosts to generate their own IPv6 addresses without the need for a DHCPv6 server. This is referred to as stateless a
    7·1 answer
  • What is a non-example for job application???
    11·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!