1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
4 years ago
12

Survey data are collected by using all of these methods EXCEPT

Computers and Technology
1 answer:
castortr0y [4]4 years ago
8 0

Answer:

Survey data are collected by using all of these methods except Field Research.

Explanation:

In field research data has been gathered from different experiments, qualitative analysis and observations of any event.

On the other hand, survey data can be collected from Following:

<u>structured interview</u><u>:</u>

where data can be gathered by interviews and analyzed it on quantitative basis.

<u>Face to face questionnaires:</u>

Data has been collected by asking questions directly from users in the form of interview.

<u>self-administered questionnaires</u>

In this research, questionnaire has been designed to asked question related to some topic without conducting interview.

You might be interested in
What sentence could Lou’s granddaughter not answer? Explain the context and discuss whether you could answer this question or no
Tanya [424]
He wouldn’t answer the context for the discussion
7 0
2 years ago
Make a program that receives several integers (the program ends when a negative number is entered) and shows how many times the
Levart [38]
I really tried to help sorry
5 0
3 years ago
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
4 years ago
Read the following characteristic:
Ivanshal [37]

Answer:

A goal of procedural programming

An advantage of object oriented programming

A disadvantage of object oriented programming

A drawback of procedural programming

3 0
2 years ago
The property that allows a metal to be drawn into wires is called...
GaryK [48]

Answer:

Malleability and ductility

Explanation:

Metals are also easily distinguished from non-metals and other materials in their ductility (ability to be drawn into a wire) and malleability (the ability to be beaten into a. sheet).

Did you need help on this with an assignment? Hope this helps!

6 0
3 years ago
Other questions:
  • 7. Which innovation in video games do you think has been most significant? Include at least one way that innovation affects the
    6·1 answer
  • Which of the following statements about personality are true? Check all of the boxes that apply.
    7·1 answer
  • Characters used to control the position of the output on the screen or paper, to cause some action to occur, such as ringing a b
    10·1 answer
  • What is an Apple Pen?
    5·2 answers
  • When Twitter is used to gather a large group for a face-to-face meeting it is called
    10·1 answer
  • What is the difference between = and == in terms of java..?
    6·2 answers
  • What is the purpose of a career portfolio?
    6·1 answer
  • How can i fix a all white phone screen
    11·2 answers
  • Can someone please give me the 3.6 code practice answer I will mark you brainlyist
    13·1 answer
  • When you connect to an Access database, which entities are shown in the Navigator window?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!