1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
11

You are tasked with accumulating survey data on a web page and are responsible for it being free from dirty data once you close

the survey and get the data to the researching team. Which is the best way to handle the possibility of dirty data?
Computers and Technology
1 answer:
Tom [10]3 years ago
4 0

Answer:

Build a website that validates data as the survey participant takes the survey.

Explanation:

Whenever a user is charged towards gathering survey information on such a webpage and seems to be liable for freeing this against bad data when the survey is closed as well as the data will be sent to the testing group.

Creating a platform that validates information is just the easiest approach to tackle the risk of bad results as when the research user completes the test.

You might be interested in
. The first step in devising security services and mechanisms is to develop a security policy True False
Evgen [1.6K]

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

5 0
3 years ago
C
Paraphin [41]
The answer is Document Inspector
5 0
2 years ago
Woah my favorite character got arrested
olasank [31]

Not sure how to answer this. But shaggy was quite amazing.

4 0
3 years ago
Read 2 more answers
If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All com
Papessa [141]

Answer:

<u>because the conclusion is not in agreement with the two premises.</u>

Explanation:

<em>Remember</em>, the term<u> syllogism</u> refers to the form of reasoning that draws its conclusion based on the stated premises. In other words, a conclusion is reached if it satisfies <em>all or part </em>of the premises.

In this case, the statement "No computer is made of clay" and  "All computers are electronic devices" should be inferred to mean, <em><u>No </u></em><em>electronic devices are made of clay" </em>not<em> </em><em>"Some electronic devices are not made of clay," </em>since the two premises neither suggest that electronic devices are made from clay.

5 0
3 years ago
What is Microsoft first product
Alenkasestr [34]

Answer:  Xenix

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • You need to access the registry on your windows 10 computer how do you do this
    9·1 answer
  • Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynami
    6·1 answer
  • What is it called to persist in trying to multitask can result in this; the scattering bits of one’s attention among a number of
    9·1 answer
  • You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its
    11·1 answer
  • The process of identifying and removing logical errors and runtime errors is called ..............
    5·2 answers
  • Help! I’ll mark you brainly! Please help me.
    15·1 answer
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!