1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
11

Leslie Is doing a sociological study of people who have live remote island. She interviews the people and than she observes them

. Whatever she is unable to ask or observe, she guesses about and adds to her study. Which of her steps is most threatening to the integrity of her study
A. Observing situations
B. Interview people
C. Choosing a topic
D. Making guesses
Computers and Technology
2 answers:
dimulka [17.4K]3 years ago
5 0
Making guesses, as opposed to the other answers, this is the only one that forges new ideas and doing such will only lead to an illegitimate conclusion/study.
dedylja [7]3 years ago
3 0

Answer: D) Making guesses

Explanation: The situation mentioned in the question about Leslie doing her study on remotely-living people and adding the unknown information on the basis of guessing technique. This step is threat to the research because she is filling-up the information by guessing, her guesses have chances of being incorrect which will lead to defects in the result of the study.

Other options are not threat because choosing subject, observation and interviewing are the correct steps that should be taken during any research. Thus , the correct option for the question is option(D).

You might be interested in
X = 10<br> y = 20<br> x &gt; У<br> print("if statement")<br> print("else statement")
Ksenya-84 [330]

Answer:

n

Explanation:

n

5 0
3 years ago
Read the scenarios below, then use the drop-down menus to decide if you should use a database.
Romashka [77]

Answer:

A. The parent-teacher orginization keeps a log of cookies sales to raise money for the elementary school.

Explanation:

5 0
3 years ago
Virtualization, like cloud computing, is a technology that can be useful for _____ sites. hot warm business cold
natima [27]

Answer: Hot sites

Explanation:

 Virtualization in the cloud computing is the technology that are useful for the hot sites. It basically making the virtual image of the network devices so that it can be easily use multiple machine at the similar time.

There are various types of benefits of the virtualization in the cloud computing are as follow:

  • It protect the system from the system failure.
  • It is the cost effective technology.
  • By using this we can easily transfer the data from the physical storage to the virtual server.
8 0
3 years ago
Which of the following assessments uses computer-adaptive technology to provide questions? SAT, ACT, ASVAB, or ACCUPLACER?
never [62]
ACCUPLACER, I hope this helps :)
7 0
3 years ago
Read 2 more answers
The music is the soul who says this
Crazy boy [7]

Question:the music is the soul who says this

Answer: Arthur Schopenhauer

Explanation: he says music is the language of feeling and of passion

question answered by

(jacemorris04)

4 0
3 years ago
Other questions:
  • To add slides to a presentation, _____.
    12·1 answer
  • The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the netw
    6·1 answer
  • Write the definitions for three function named max. Each receives two parameters, of the same type, and returns the larger of th
    12·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    14·2 answers
  • which is the quickest way to change the font color in multiple, randomly located cells in a worksheet?
    6·2 answers
  • Mrs. Zoo gave out the rubric for our essay. She stated that our essay should be complete by Friday of that week. I didn't have t
    13·1 answer
  • Which support function under Tech Mahindra is governing data privacy and protection related requirements
    15·1 answer
  • What is a trojan horse
    8·2 answers
  • Create a multimedia project that contains the text element and all the contents that you have studied about that element
    13·1 answer
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!