1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
6

Which of the following is true regarding data analysis? a. Disciplines and professions do not provide guidance on data analysis.

b. Data analysis methods should usually be specified in advance before a study begins. c. Data analysis methods are generally uniform across disciplines. d. Data analysis methods can typically be specified at the close of a study after it is clear what kind of data has been collected.
Computers and Technology
2 answers:
Vladimir [108]3 years ago
5 0

Answer:

b. Data analysis methods should usually be specified in advance before a study begins.

Explanation:

Data analysis is the process of gathering or collecting, inspecting and evaluating data. The first process in data analysis is the collection of data. Analysis cannot take place if there is no data. Also, data analysis can take place at all phases of a research or study - beginning, during and at the end.

The main purpose of data analysis is to get reasonable and useful information and come up with logical business decisions and as such should be  typically done in advance before a study begins.

alisha [4.7K]3 years ago
3 0

Answer: Option (B) is correct

Explanation:

Data analysis is known as a process or technique of cleansing, inspecting, transforming and also modeling data with the aim or goal of discovering useful and vital information, briefing conclusions and thus finally supporting decision-making. It tends to have multiple approaches and facets, encompassing or enclosing diverse methods under several names, and thus is used in several different science, business, and dismal science domains.

You might be interested in
Dialogue is not a characteristic of functional text because...
kumpel [21]
It is b,<span>dialogue it's speech between characters, and there are no characters and functional text </span>
4 0
3 years ago
What's wrong with these codes in code HS Karel challenges(7.1.2. Racing Karel) Codes: //Below is the program that have Karel mov
Viktor [21]

Answer:

The program only runs 5 five since the for loop statement is limited to loop only five times.

Explanation:

In programming, a for-loop statement is used to repeat a collection of events a definite number of times. The number of loops is specified and compared with a variable to execute a block of code.

The for-loop statement in the code above declares and initializes a variable "i" to zero, runs the block of code, and increments by one if it is less than 5.

To make it run eight times, the value five should be changed to 8 instead.

5 0
2 years ago
A web designer is creating a web site and wants each browser to resize the text size to look the same in each device. what measu
adelina 88 [10]
The designer could use the measurements in pixels. 
4 0
3 years ago
Compare userNumber with compareNumber and display 'Numbers are not equal' if the numbers are different. Then, display 'Variables
masya89 [10]

Answer:

Following are attached images that will help you understand the complete code. The code is tested with different variables and different outputs are obtained. All the necessary description is given in the form o comments inside the code.

Explanation:

3 0
3 years ago
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal _
german

Answer:

You should install a personal firewall, a program that protects your computer from unauthorized access by blocking certain types of communications.

Explanation:

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

8 0
3 years ago
Other questions:
  • With a patent on drug Z27, why would Able Drug Company charge customers $7 per 100 units even though its cost of producing 100 u
    5·2 answers
  • Can someone please help me with this question??
    12·1 answer
  • HELP ASAP
    9·1 answer
  • Self contained sequences of actions to be performed are?
    6·1 answer
  • The scheme function (mult2-diff Ist) should take one argument, a list of numbers, and results in multiplying each number in the
    11·1 answer
  • _______ is a communications protocol used to send information over the web. HyperText Markup Language (HTML). URL (Uniform Resou
    10·1 answer
  • Writing in Java, write a program that prompts the user to input an integer and then outputs both the individual digits of the nu
    15·1 answer
  • How many report charts can be added to the account page layout to meet this requirement? A sales manager would like to look at a
    14·1 answer
  • What can happen if you do not follow the directions when cooking or baking? (Give 4 examples in a sentence each)
    8·1 answer
  • Camera work is at the center of video production. True or False?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!