1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
12

A high school teacher conducted a test of a new approach to teaching math. Students were given a pretest when their math class b

egan and a posttest at the end of the semester. The students' math performance improved. The teacher learned near the end of the semester, however, that in their science classes the students were using new computer software that included much of the math the teacher covered in his course. What threats to internal validity does the new computer software represent?
Computers and Technology
1 answer:
MakcuM [25]3 years ago
5 0

Answer:

It represents a threat of instrument change.

Explanation:

Internal validity is a method to determine if research has been performed properly. It is based on the number of confounding variables present in the experiment. If an experiment is carried out and confounding variables are avoided, the internal validity is high, and viceversa. In an ideal context, the experiment's internal validity will be high, which will mean its results will be trustworthy.

The students, by making use of a computer software, lowered the validity of the test performed by the teacher.

You might be interested in
It is a data being transported on a network​
sleet_krkn [62]

Answer:

The answer is <em>data packet or packet.</em> A packet is a small amount of data that is travelling, sending or receiving in the network.

6 0
3 years ago
Private BLANK are cloud services available to members of a particular organization.
dalvyx [7]

Answer:

A private cloud is a set of applications and resources that are available only to individuals within a specific organization. These resources may be owned by the organization itself or by a third party, and may be hosted inside or outside

Explanation:

.

4 0
3 years ago
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
What was bill gates first operating system he created?
vagabundo [1.1K]
Microsoft windows was his first

3 0
3 years ago
At a local burger chain, a customer became extremely angry. Everyone took notice at the person, who was yelling at anyone he cou
leonid [27]

Answer: Donald, the branch manager displayed people skills  

Explanation: People skills are a combination of behavior and behavioral interactions between people. There are many abilities that fall under the category of people skills, for example, personal effectiveness, interactive skills and negotiation skills. While the customer was shouting, Donald patiently heard and tried to calm the customer which reflected that he respected and valued the customer and kept a positive behavior towards the customer.


5 0
3 years ago
Read 2 more answers
Other questions:
  • Write an expression to print each price in stock_prices. sample output for the given program: $ 34.62 $ 76.30 $ 85.05
    6·1 answer
  • During the charging of a storage battery, what is the temperature that the electrolyte solution must never exceed?
    6·1 answer
  • The amount of data produced worldwide is increasing by ___% each year.
    5·1 answer
  • Why is it important to respect other political opinions
    7·2 answers
  • You want to configure two DHCP servers; one is running Windows Server 2012 R2, and the other is running Windows Server 2016. One
    9·1 answer
  • Retraining is required at intervals of ___ or less.
    10·1 answer
  • A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof
    12·2 answers
  • Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the i
    6·1 answer
  • A different way of pronoucing the same words is called a _____
    15·1 answer
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!