1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
4 years ago
12

Survey data are collected by using all of these methods EXCEPT

Computers and Technology
1 answer:
castortr0y [4]4 years ago
8 0

Answer:

Survey data are collected by using all of these methods except Field Research.

Explanation:

In field research data has been gathered from different experiments, qualitative analysis and observations of any event.

On the other hand, survey data can be collected from Following:

<u>structured interview</u><u>:</u>

where data can be gathered by interviews and analyzed it on quantitative basis.

<u>Face to face questionnaires:</u>

Data has been collected by asking questions directly from users in the form of interview.

<u>self-administered questionnaires</u>

In this research, questionnaire has been designed to asked question related to some topic without conducting interview.

You might be interested in
Can someone help me please
Andreyy89
Your anwser will be the last one
6 0
4 years ago
Read 2 more answers
If the contents of encrypted file1.nc and encrypted file3.nc are different, but the original file1 and file3 are the same, and y
Over [174]

Answer:

The Difference is because of the salt added to the password before hashing or encrypting it.

Explanation:

The Difference is because of the salt added to the password before hashing or encrypting it.

Salts are random data used to mention uniqueness. Suppose if two users have same password for the same system. By adding Salt to the password makes it unique in the crypto system. Its a added security layer which can safeguard the passwords or hashed data in the keystore or storage.

Salt can be prepended to the password or appended to the password.

Suppose the password is “stuti” then its SHA256 HASH value is <u><em>“4beb1eb6f438495eede7b14ac0d2b955636a49412cd4eb5714341f5716144954”</em></u>

So, if we add a salt with random string <em>brainlysalttest</em> then its SHA256 HASH value is <u><em>“5429e85778f1b9f493da637848f253dedf3edbfbb72782d43eb7337cee45ab0c”</em></u>

If we append the salt <em>brainlytestsalt</em> to the same password and hash it using SHA256 then its hash value is : <u><em>“3919b677d80ae0da2b58f70b464f6492670ccffee78cf52972c6983995ed8f52”</em></u>

So clearly Salting to the password and Hashing the salted password will make the difference and also unique.

3 0
3 years ago
________ states that the value of a network is equal to the square of the number of users connected to it.
Juliette [100K]

Answer:

This is known as the Metcalfe's Law

Explanation:

In 1980, Metcalfe's law was first presented, not considering users but the communication among compatible devices (e.g. telephone, fax machines and so on). It was after the globalization of the internet that the law got introduced to users and networks.

A demonstration of the law can be seen in fax machines, one fax machine is purposeless, however, the interconnection of multiple fax machines on the network increases the value of every fax machine because the number of the users of the fax machines increases. Similarly, the more the users of a particular service, the more relevant the service becomes.

8 0
3 years ago
Read 2 more answers
Can Anyone Send Me The Correct Code To This ?<br><br> ITS JAVA
scoundrel [369]

Answer:

whta u mean by code?

Explanation:

8 0
3 years ago
Full Form of CPU AND RAM ?
sweet [91]

Answer:

IN COMPUTER TERMS:

CPU is centrsl processing unit

RAM is random access memory

7 0
3 years ago
Read 2 more answers
Other questions:
  • A dropped packet is often referred to as a _____________.
    7·1 answer
  • To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
    13·2 answers
  • Why is it important to brain storm and develop concepts prior to selecting an idea that you wish to move forward with as a solut
    7·1 answer
  • Which of the following would you not see on a windows 10 start menu?
    6·1 answer
  • URLs are the global ______ of resources on the Internet.
    12·2 answers
  • Write any one method to delete a table in writer​
    11·1 answer
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    10·1 answer
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
  • True or false scientists investigate and seek to explain the natural world
    14·1 answer
  • What sound customization option would you use in Scratch to simulate a sound happening in a large, empty room (like a theater)?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!