1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
2 years ago
11

Leslie Is doing a sociological study of people who have live remote island. She interviews the people and than she observes them

. Whatever she is unable to ask or observe, she guesses about and adds to her study. Which of her steps is most threatening to the integrity of her study
A. Observing situations
B. Interview people
C. Choosing a topic
D. Making guesses
Computers and Technology
2 answers:
dimulka [17.4K]2 years ago
5 0
Making guesses, as opposed to the other answers, this is the only one that forges new ideas and doing such will only lead to an illegitimate conclusion/study.
dedylja [7]2 years ago
3 0

Answer: D) Making guesses

Explanation: The situation mentioned in the question about Leslie doing her study on remotely-living people and adding the unknown information on the basis of guessing technique. This step is threat to the research because she is filling-up the information by guessing, her guesses have chances of being incorrect which will lead to defects in the result of the study.

Other options are not threat because choosing subject, observation and interviewing are the correct steps that should be taken during any research. Thus , the correct option for the question is option(D).

You might be interested in
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
creativ13 [48]

Select All that apply

Answer:

These are the things that are would be appropriate in a post.

B. Checking your post for typos or grammatical errors.

C. Giving credit to the original author.

D. Including your own thoughts about the article.

Explanation:

The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.

7 0
2 years ago
Describe the nodes in a 2-4 tree.
aivan3 [116]

Answer:

The node of the 2-4 tree can have at most three values.

There are basically 3 types of nodes in the 2-4 tree which are as following:-

  1. 2-Node.
  2. 3-Node.
  3. 4-Node.

2-Node:-It contains 1 data element and two child pointers.

3-Node:-It has 2 data elements and three child pointers.

4-Node:-It has 3 data elements and four child pointers.

There is also leaf node which can contain 2,3 or 4 data elements but has no child pointers.

4 0
3 years ago
What are three procedures used by browsers
ra1l [238]
I believe that the three procedures are...

1.  Sub - Standard sub routine

2.  Function - a routine that returns an answer

3.  Property - reserved for <span> Class Modules</span>

<span>Hope this helps, please mark brainliest!</span>

5 0
3 years ago
Read 2 more answers
BlockPy: #38.2) While Input Use a while loop to repeatedly take input from the user and print whatever they type in. When the us
BARSIC [14]

Answer:

strr=input("please enter something: ")

while strr is not "":

   print(strr)

   strr=input("please enter something: ")

Explanation:

whenever the user will enter an empty string the loop will terminate

8 0
3 years ago
Other questions:
  • Jason works as an accountant in a department store. He needs to keep a daily record of all the invoices issued by the store. Whi
    5·2 answers
  • A person planning to file for bankruptcy must receive credit counseling within two years before filing the petition.
    7·1 answer
  • Which statement compares the copy and cut commands?
    5·2 answers
  • Which of the following is NOT a destination?
    12·2 answers
  • Which of the following was the name of the first generation of cell phone networks?
    14·1 answer
  • as the new hr manager hired by a company to clean up some of the company's problems,analyse the system requirements for the comp
    14·1 answer
  • A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof
    12·2 answers
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
  • PLEASE HELP ASAP what is the main purpose of electronic speed controller ESC
    9·2 answers
  • How is ict integrated into marketing<br>​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!