1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
8

It is difficult to use screening questions in computer-assisted surveys. a. True b. False

Computers and Technology
1 answer:
Sedbober [7]3 years ago
5 0
This is FALSE

Apart from the traditional pen and paper methods, there is an increased emergence of tools that can be used in market and public opinion research. For instance, we can use computer assisted telephone interviews, self-administered computer methods and computer assisted face to face interviewing methods



You might be interested in
Given an object context for an Entity Data Model named mmaBooks, which of the following statements would you use to add a Custom
ehidna [41]

Answer:

"mmaBooks.Customers.Add(customer);" is a correct answer for the above question.

Explanation:

Missing information : The correct answer is missing in the question which is defined in the answer part.

  • If a user wants to add any objects to any collection in the C# programming, then he needs to follow the "Entity_data_model_named. collection_name. ADD(object_name)" syntax. The above question also wants this type of statement.
  • The option c states the same statements, but there is needs one statement to define the name of db or database models. But the option c does not hold the name of the database models. Hence it is not the correct answer.
  • And the other options do not follow the syntax to add, hence others is also not a valid option.
3 0
3 years ago
A diagram of a ten-node network that uses ten routers
tiny-mole [99]

The diagram of the of a ten-node network that uses ten routers is given in the image attached.

<h3>What is a node in a network?</h3>

A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.

Note that they are known to often receive and send data from one network or endpoint to another.

Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.

Learn more about routers from

brainly.com/question/24812743

#SPJ1

3 0
2 years ago
The function takes two string parameters; the first is the name of a file and the second is text. Complete the function to appen
castortr0y [4]

Answer:

The code for the function is given below in Python language

Explanation:

def append_string_to_file(filename, text):// function takes the filename // and text  to append

f = open(filename, 'a')

f.write(text) //function part that writes the text

f.close() //closing the file using the explicit close function

3 0
4 years ago
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
3 years ago
For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we incre
erastovalidia [21]

Answer:

The answer is below

Explanation:

The amount of power dissipated by a processor is given by the formula:

P = fCV²

Where f = clock rate, C = capacitance and V = Voltage

For the old version of processor with a clock rate of f, capacitance C and voltage of V, the power dissipated is:

P(old) = fCV²

For the new version of processor with a clock rate of 20% increase = (100% + 20%)f = 1.2f, capacitance is the same = C and voltage of 20% increase = 1.2V, the power dissipated is:

P(new) = 1.2f × C × (1.2V)² = 1.2f × C × 1.44V² =1.728fCV² = 1.728 × Power dissipated by old processor

Hence, the new processor is 1.728 times (72.8% more) the power of the old processor

4 0
3 years ago
Other questions:
  • Gateway drugs are normally not addictive
    15·2 answers
  • Prominent is another word for stands out. True False
    13·1 answer
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • Which is a natural hazard that can cause extinctions? Choose all that apply.
    6·1 answer
  • ______ is a slow process that takes place in nature. (2 points)
    8·1 answer
  • What are the paparazzi?
    8·1 answer
  • Ania has written this SimpleStopwatch class. In which line is she measuring the elapsed time?
    13·1 answer
  • . Write at least three benefits of using a network.​
    8·1 answer
  • How should excel Identify social security numbers: as a text, numbers, or date and time? Why?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!