1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
11

You are tasked with accumulating survey data on a web page and are responsible for it being free from dirty data once you close

the survey and get the data to the researching team. Which is the best way to handle the possibility of dirty data?
Computers and Technology
1 answer:
Tom [10]3 years ago
4 0

Answer:

Build a website that validates data as the survey participant takes the survey.

Explanation:

Whenever a user is charged towards gathering survey information on such a webpage and seems to be liable for freeing this against bad data when the survey is closed as well as the data will be sent to the testing group.

Creating a platform that validates information is just the easiest approach to tackle the risk of bad results as when the research user completes the test.

You might be interested in
The Knowledge Consistency Checker (KCC) ensures the maximum number of hops between any two domain controllers does not exceed wh
Katarina [22]

Answer:

Three (3)

Explanation:

Explanation of the three basic terms here - Knowledge consistency checker, hops and domain controller - will give a clearer answer and explanation to the question as follows;

<em>Domain controller</em> : is a server controller that gives access or controls to users on computer networks by first responding to their authentication requests and verifying those users. In other words, a domain controller is a network security manager.

<em>Hop</em> : A hop is simply the passage of data packets from one network to another. As  a packet moves from its source to destination, it moves from router to router. The number of such routers that the packet passes through is called a hop.

<em>The Knowledge Consistency Checker (KCC)</em> :  It is the job of the KCC to ensure that these domain controllers participate in the replication promptly and orderly. Replication means copying data from one location to another (within a network or among networks). The KCC ensures that the maximum number of hops permitted is does not exceed 3. i.e no domain controller is more than 3 hops from any other domain controller within a network.

Note: Replication is of two types - intrasite (among all domain controllers within a site) and intersite (among all domain controllers in different sites), and the KCC can manage both type of replication. Also, by default, at every 15 minutes interval, a domain controller generates a replication topology (a logical map that dictates the domain controllers that will replicate with each other).

<em>Hope this helps!</em>

3 0
3 years ago
List the steps that you need to locate Microsoft Word on your computer
Olegator [25]
1.click windows start button on the bottom left corner
2. search Microsoft word
3.once Microsoft word is found right click on it
4. then you will see an option called "open file location"
5. then you will have the location of microsoft word
6 0
3 years ago
Please list the computer data hierarchy from bit to database
vladimir2022 [97]

Answer:

 Data hierarchy is basically define to the data which is organized in the systematic manner. The main concept of the data hierarchy is to check the basic structure of the data. It basically involve the fields records and files for the data organization.

The following is the list of the computer data hierarchy from nit to address are:

1) Bit: It is the smallest unit of the data.

2) Field: The collection of all the characters in the data is known as field.

3) Record: The collection of the different fields is known as records.

4) File: The collection of various types of records in the database is known as file.

8 0
3 years ago
Consider the following scenario below and recommend a solution.
sammy [17]

your account has enabled profile pictures for your users, you can manage all profile pictures for your account. Profile pictures are public and automatically approved when users upload an image in their settings. Using profile pictures can make it easier to see the users in your account and managing them gives you the ability to keep the pictures appropriate.

If Gravatars are enabled for an institution in account settings, and a user has a Gravatar but chooses not to upload a profile picture, the Gravatar will display for the user's profile picture.

If a student views another student's user details in a course and reports a profile picture as inappropriate, you can review those profile pictures and approve, lock, or delete the picture. In the courses, instructors can remove profile pictures completely from a user's details page.

5 0
3 years ago
A(n) ______ is a type of collaborative website that allows users to create, add, modify, or delete website content.
andrey2020 [161]
<span>A wiki is this type of site. The users can, anonymously or with a profile, add to or delete content already posted. This gives the community the ability to add to the overall knowledge base on a specific subject. The site tracks changes through IP addresses to make sure that changes are not done maliciously.</span>
8 0
3 years ago
Other questions:
  • Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
    6·1 answer
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • A user can easily moved to the end of document by pressing what key combination?
    8·2 answers
  • Erica is CEO of a company and has recently hired a vice president of marketing. She would like to share this information with al
    13·2 answers
  • After an informative session, you find yourself with several pages of notes. For maximum retention and understanding, you should
    6·1 answer
  • Probability can be used to determine the likelihood of specific __________
    6·2 answers
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • (fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
    13·1 answer
  • Why might an algorithm created to assist in hiring decisions be biased?
    15·1 answer
  • Var words = ["apple", "bug","car", "dream", "ear", "food"]
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!