Answer:
Survey data are collected by using all of these methods except Field Research.
Explanation:
In field research data has been gathered from different experiments, qualitative analysis and observations of any event.
On the other hand, survey data can be collected from Following:
<u>structured interview</u><u>:</u>
where data can be gathered by interviews and analyzed it on quantitative basis.
<u>Face to face questionnaires:</u>
Data has been collected by asking questions directly from users in the form of interview.
<u>self-administered questionnaires</u>
In this research, questionnaire has been designed to asked question related to some topic without conducting interview.
<u><em>Answer:</em></u>
<u><em>The speed is </em></u>
<u><em>=
</em></u>
<u><em>30
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>
</em></u>
<u><em>Explanation:
</em></u>
<u><em>The speed of a wave is given by
</em></u>
<u><em>
</em></u>
<u><em>speed
</em></u>
<u><em>(
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>)
</em></u>
<u><em>=
</em></u>
<u><em>frequency(Hz)
</em></u>
<u><em>×
</em></u>
<u><em>wavelength (m)
</em></u>
<u><em>
</em></u>
<u><em>The frequency is </em></u>
<u><em>f
</em></u>
<u><em>=
</em></u>
<u><em>100
</em></u>
<u><em>H
</em></u>
<u><em>z
</em></u>
<u><em>
</em></u>
<u><em>The wavelength is </em></u>
<u><em>λ
</em></u>
<u><em>=
</em></u>
<u><em>0.3
</em></u>
<u><em>m
</em></u>
<u><em>
</em></u>
<u><em>The speed is
</em></u>
<u><em>
</em></u>
<u><em>v
</em></u>
<u><em>=
</em></u>
<u><em>λ
</em></u>
<u><em>f
</em></u>
<u><em>=
</em></u>
<u><em>0.3
</em></u>
<u><em>⋅
</em></u>
<u><em>100
</em></u>
<u><em>=
</em></u>
<u><em>30
</em></u>
<u><em>m
</em></u>
<u><em>s
</em></u>
<u><em>−
</em></u>
<u><em>1
</em></u>
<u><em>
</em></u>
<u><em></em></u>
<u><em></em></u>
<u><em></em></u>
Answer:
Option a: Trojan
Explanation:
A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.
However, Trojan cannot be replicated in the infected computer.
Answer:
blep blep blep belp belp belp belp belp belp BELPPPPPPPPPP