1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
12

A high school teacher conducted a test of a new approach to teaching math. Students were given a pretest when their math class b

egan and a posttest at the end of the semester. The students' math performance improved. The teacher learned near the end of the semester, however, that in their science classes the students were using new computer software that included much of the math the teacher covered in his course. What threats to internal validity does the new computer software represent?
Computers and Technology
1 answer:
MakcuM [25]3 years ago
5 0

Answer:

It represents a threat of instrument change.

Explanation:

Internal validity is a method to determine if research has been performed properly. It is based on the number of confounding variables present in the experiment. If an experiment is carried out and confounding variables are avoided, the internal validity is high, and viceversa. In an ideal context, the experiment's internal validity will be high, which will mean its results will be trustworthy.

The students, by making use of a computer software, lowered the validity of the test performed by the teacher.

You might be interested in
What are the core scripting and coding technolies used to build ai platforms?
boyakko [2]
<span>Artificial Intelligence is a huge field. </span>
4 0
3 years ago
Please anyone, help me.... I'm not sure how to put these all together.<br> 35 points!
Vilka [71]

Answer:

#School Name

school_name = "Klein Cain"

# Asks for name

full_name = input("Please enter your full name ")

#Says Hello

print("Hello, ", full_name, "!!")

#Says the letters in your name

print("There is ", len(full_name), " letters in your name")

#Says final message

print("??? is a Cain where??? ", school_name)

7 0
3 years ago
Read 2 more answers
The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
STatiana [176]

Answer:

Bandwidth

Explanation:

Bandwidth is the rate of transfer of data in the given time. Its unit is Bit/sec.

It is used to measure the transfer rate of bit in a network.

4 0
3 years ago
The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a clus
kondaur [170]

The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a cluster of processors is known as <u>parallel computing.</u>

<u></u>

<h3>What is Parallel Computing?</h3>

Parallel computing refers to the process of breaking down larger problems into smaller, independent, often similar parts that can be executed simultaneously by multiple processors communicating via shared memory, the results of which are combined upon completion as part of an overall algorithm. The primary goal of parallel computing is to increase available computation power for faster application processing and problem solving.

<h3>Types of parallel computing</h3>

There are generally four types of parallel computing, available from both proprietary and open source parallel computing vendors:

  • Bit-level parallelism: increases processor word size, which reduces the quantity of instructions the processor must execute in order to perform an operation on variables greater than the length of the word.
  • Instruction-level parallelism: the hardware approach works upon dynamic parallelism, in which the processor decides at run-time which instructions to execute in parallel; the software approach works upon static parallelism, in which the compiler decides which instructions to execute in parallel.
  • Task parallelism: a form of parallelization of computer code across multiple processors that runs several different tasks at the same time on the same data.
  • Superword-level parallelism: a vectorization technique that can exploit parallelism of inline code.

Learn more about parallel computing

brainly.com/question/13266117

#SPJ4

5 0
1 year ago
A keyboard, mouse, and microphone are examples of ________.
kykrilka [37]

Answer:

A keyboard, mouse, and microphone all are examples of <u>peripheral devices.</u>

Explanation:

hope this helps

5 0
2 years ago
Read 2 more answers
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • Which is the correct process for attaching a file?
    12·1 answer
  • The marketplace is the essence of which of the following?
    11·1 answer
  • Many of the first photographers were actullay scientists and inventors
    11·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • 4.2 Lesson Practice​
    8·2 answers
  • Most effective way of closing email is<br>​
    7·2 answers
  • Define the term visual as used in visual programming
    9·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!