1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
11

Leslie Is doing a sociological study of people who have live remote island. She interviews the people and than she observes them

. Whatever she is unable to ask or observe, she guesses about and adds to her study. Which of her steps is most threatening to the integrity of her study
A. Observing situations
B. Interview people
C. Choosing a topic
D. Making guesses
Computers and Technology
2 answers:
dimulka [17.4K]3 years ago
5 0
Making guesses, as opposed to the other answers, this is the only one that forges new ideas and doing such will only lead to an illegitimate conclusion/study.
dedylja [7]3 years ago
3 0

Answer: D) Making guesses

Explanation: The situation mentioned in the question about Leslie doing her study on remotely-living people and adding the unknown information on the basis of guessing technique. This step is threat to the research because she is filling-up the information by guessing, her guesses have chances of being incorrect which will lead to defects in the result of the study.

Other options are not threat because choosing subject, observation and interviewing are the correct steps that should be taken during any research. Thus , the correct option for the question is option(D).

You might be interested in
Information Governance (IG) consists of? A. the overarching policies and processes to optimize and leverage information while ke
Tems11 [23]

Answer:  A) the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives

Explanation: Information governance(IG) is the act for the information to store , create, archive,deleting, valuing etc.This step is used for making the information secure and optimizable when required. IG gives the control over the information with respect to particular policy.

Other options are incorrect because frameworks used for extraction of  most of IT investments is known as IT(Information technology ) governance and method used for ensuring the data for forming database is known as data governance .Thus, the correct option is option(A).

4 0
3 years ago
You need to find out more about the fdisk utility and the commands associated with it before you set up a new Linux system in ad
Ivenika [448]

Answer:

Option A i.e., man fdisk.

Explanation:

If the user wants to finds more regarding the fdisk utility as well as the related instructions until setting up a new Linux system besides those that are currently utilizing. So, the following man fdisk command could be used to finds more regarding fdisk on his current system.

Other commands are not useful for according to the following scenario because they are used in Linux for other purposes.

5 0
3 years ago
Which of the following<br> Services are<br> functions performed<br> by the general office?
GaryK [48]

Answer:

comment the choices please

6 0
2 years ago
Graphic design has as its goal the communication of some __________ message to a group of people.
Aleks [24]
Graphic design has as its goal the communication of some specific message to a group of people.

Specific is your answer.
3 0
3 years ago
How useful do you find the creation of folders in your computer? Explain why.
kykrilka [37]
I find the creation of folders to be very helpful as if i didn't have folder there would br no order in my file management
8 0
3 years ago
Read 2 more answers
Other questions:
  • What type of protocol provides a way to transfer files from one computer to another over tcp/ip such as lan?
    9·1 answer
  • Some cars are 100 percent efficient at converting energy from gasoline to energy of motion.
    11·2 answers
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
    15·1 answer
  • Consider the following methods.public void modParams(int[] x, int[] y, String[] s){x[1] = 5;y = x;s[1] = new String("five");s =
    6·1 answer
  • The___is a waterproof fabric that is placed around your camera
    7·1 answer
  • In saving a Visual Basic project properly , which of the following: two components part are involved ?
    6·1 answer
  • Ew<br>subject: Computer<br>11101÷101<br> binary operations<br>​
    7·1 answer
  • Which of the following statements holds true for the term plug-in? Group of answer choices It refers to a program (typically a m
    11·1 answer
  • What level of system and network configuration is required for cui?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!