1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
10

How do the search methods differ for primary and secondary data?

Computers and Technology
2 answers:
PilotLPTM [1.2K]3 years ago
6 0
My senses lead to A.
viktelen [127]3 years ago
5 0

Answer:

The answer is <u>D</u>

These data use the same processes.

You might be interested in
54 points!!! Cyber security
Veseljchak [2.6K]

Answer:

a

Explanation:

3 0
3 years ago
Can someone please help me
inn [45]

A pallet jack is a manually operated forklift

3 0
4 years ago
A network with 10 bits remaining for the host portion will have how many usable host addresses?
makvit [3.9K]

Answer:

2^10 = 1024 addresses

Explanation:

Each bit can be either 1 or 0, and this holds true for all 10 bits. So for every bit, we choose either a 0 or a 1 (2 choices), and then do so for the remaining bits. So we have 2 * 2 * 2 * ... * 2 (10 2's) choices for all 10 bits

8 0
3 years ago
1. Software used to search a database using keywords or phrases entered by the user.
vladimir1956 [14]

Answer:

1 C

2 D

3 B

4 A

5 D

6 B (the question should state software that manages ...)

7 D

8 C

9 A

10 B

11 C

12 D

13 B

Explanation:

6 0
3 years ago
Explain how communication promotes cooperation and industrial peace​
tensa zangetsu [6.8K]

Explanation:

Communication helps the management to know what the organisation wants and how it can be performed. Through effective way of communication it promotes the industrial peace and good relations. 7. ... It enables the management to take managerial decisions which depends upon the quality of communication.

4 0
3 years ago
Other questions:
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • Explain why a computer cannot solve a problem for which there is no solution outside the computer.
    14·1 answer
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • A computer ____ is the amount of data (typically measured in bits or bytes) that a cpu can manipulate at one time.
    8·1 answer
  • Write a method called sum with a while loop that adds up all numbers between two numbers a and b. The values for a and b can be
    11·2 answers
  • You’re dying to see the flaming eyelashes in concert this summer what’s the best way to cop a few tickets
    6·1 answer
  • Describe the operation of IPv6 Neighbor Discovery. ​
    7·1 answer
  • Who is the founder of C language?​
    9·1 answer
  • What type of email communication reaches out to former clients and older prospects and encourages a reply? Strategic email Onboa
    5·1 answer
  • when inputting a formula into excel or other spreadsheet software, what components are required for the formula to function prop
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!