1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
4 years ago
12

Survey data are collected by using all of these methods EXCEPT

Computers and Technology
1 answer:
castortr0y [4]4 years ago
8 0

Answer:

Survey data are collected by using all of these methods except Field Research.

Explanation:

In field research data has been gathered from different experiments, qualitative analysis and observations of any event.

On the other hand, survey data can be collected from Following:

<u>structured interview</u><u>:</u>

where data can be gathered by interviews and analyzed it on quantitative basis.

<u>Face to face questionnaires:</u>

Data has been collected by asking questions directly from users in the form of interview.

<u>self-administered questionnaires</u>

In this research, questionnaire has been designed to asked question related to some topic without conducting interview.

You might be interested in
The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
arsen [322]

Answer:

Digital Millennium Copyright Act

Explanation:

Digital Millennium Copyright Act (DMCA) is a protection placed on creative works online and gave content owners the authority to have their contents removed from websites who use it without permission, the act prohibits the reselling and giving away of commercial programs, contents or devices, violating the act is criminal

5 0
4 years ago
Microsoft s trash receptacle is called
solmaris [256]
The term that is being looked for in this problem would be most probably and most likely to be the Recycle Bin.

Microsoft's trash receptacle is called the Recycle Bin. This is where deleted files and folder are moved after being deleted. Simple selecting the file or files and pressing the delete key would prompt you to make sure that you really wanted to do this. This is a precautionary action of the computer to let you know what you are about to do. This is to make sure that errors wouldn't happen in the future since some files are highly sensitive, some programs also are, and some files are just too big for the Recycle Bin to be handled, thus they are deleted permanently.
3 0
4 years ago
What does spyware do on your computer?
faust18 [17]
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owners private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. if this helps any....
6 0
3 years ago
"Dean wants a quick way to look up staff members by their Staff ID. In cell Q3, nest the existing VLOOKUP function in an IFERROR
Feliz [49]

Answer:

ierror(VLOOKUP(Q2,CBFStaff[[Staff ID]:[Name]],2,FALSE), "Invalid Staff ID")

Explanation:

Let me try as much as I can to explain the concept or idea of iferror in vlookup.

iferror have a typically function and result like an if else statement, its syntax is IFERROR(value,value _ if _ error), this simply means that if the the error is equal to value, value is returned if not, the next argument is returned.

Having said that, feom the question we are given,

let's substitute the value with vlookup function and add an else argument, it will look exactly this way;

IFERROR(VLOOKUP(),"Invalid Staff ID")// now this will set the message if vlookup cannot find the.

On the other hand using the values given, we will have;

ierror(VLOOKUP(Q2,CBFStaff[[Staff ID]:[Name]],2,FALSE), "Invalid Staff ID")

4 0
4 years ago
Differentiate between smudge and dodge tool.​
Pavlova-9 [17]

Answer:

They are the same as the clone tool.

Explanation:

4 0
2 years ago
Other questions:
  • Which of the following is false?
    7·1 answer
  • The use of quick styles is a great way to save _____.
    6·1 answer
  • Which of the followings is design tool?[2 marks]
    8·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • What are the benefits of transferable skills check all the boxes that apply
    6·2 answers
  • Select the online reading comprehension tool that best fits the description. This tool lets users change text from one language
    6·2 answers
  • When a manager is told that it's acceptable to take credit for work that junior
    11·1 answer
  • Which of these are correctly formatted Python tuples? CHECK ALL THAT APPY.
    15·2 answers
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • Verizon's implementation of a web-based digital dashboard to provide managers with real-time information such as customer compla
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!