1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
2 years ago
13

Mention two strategies of collecting data​

Computers and Technology
1 answer:
melisa1 [442]2 years ago
7 0
Types of quantitative and qualitative data collection methods include surveys and questionnaires, focus groups, interviews, and observations and progress tracking.
You might be interested in
What is a logical reason why you should be able to delete your own posts on social media?
Furkat [3]

People live in the moment and post whatever they want and they just might regret it later on.

3 0
3 years ago
Read 2 more answers
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords b
insens350 [35]

After I have changed her password, all I will need to do is select the “User must change password at next logon” option. This option will prompt her to log on to her PC using the password I assigned to her.

Explanation

An active Directory on most Domain Controllers gives you access to add users, disable accounts, change password, and various other tasks. Assuming that everything is setup, I am just going to go to my Windows Server Manager dashboard of my Domain Controller. While I am at my dashboard, I will click on tools and then drop down to the Active Directory Users and Computers to locate my desired user who seems to have been locked out.

Once the user has been identified, I will simply need to right click on the account and select “reset password”. A small dialog box with a list of cool security options will pop up. I will be required to reset it to something simple and default and make sure to select the “User must change password at next logon” option.

What this means is that the user who is locked out, upon logging back in, will be prompted to enter the password I gave them first as default but then will immediately be asked to change the password to something new. We do not see options A and B a lot in the real world. It is best practice not to select these options

Learn more about Active Directory

brainly.com/question/13615178

brainly.com/question/13591643

#LearnWithBrainly

5 0
3 years ago
A computer connected to the internet that asks for data is a ________. aggregator surrogate server client
Tems11 [23]
The answer to this question would be client.

Client is the computer that most people use. When you browsing a web using the internet, your computer will ask for data from the web server and the data will be arranged into graphical picture or words what you see on your monitor. Server is the computer that gives data the client ask for.
3 0
3 years ago
Identify the software in the computer that will receive and manage all interrupt signals.
vfiekz [6]

Answer:

cookies

Explanation:

3 0
2 years ago
Convert Dec 185 to Binary Byte
nata0808 [166]

Answer:

185 = 1011 1001

252 = 1111 1100

Explanation:

If you add the decimal values corresponding to the bit positions that are 1, you get your decimal number.

5 0
2 years ago
Other questions:
  • Dell Computer purchases parts and resources for its computers from multiple suppliers that are spread across the world. This pra
    8·1 answer
  • Which item refers to an illusion of figures and shapes in motion, which we commonly see in movies and video games?
    9·1 answer
  • The ability for a protocol or program to determine that something went wrong is known as_________.
    15·1 answer
  • When using a wireless mouse, what is the most common port used for the transmitter? 
    7·1 answer
  • 15
    5·2 answers
  • Which rotation speed is not a typical spindle rotation speed for magnetic hard drives?3100; 5400; 7200; 10000
    8·1 answer
  • Select all statements below that are TRUE for For...Next loops. A. It is used for a fixed number of iterations. B. It is used fo
    10·1 answer
  • For a business that is properly using a social media information system, the system can
    13·1 answer
  • 2+2? D: I don't knoww​
    12·1 answer
  • Which emerging technologies will have more injury on our day to day country & How?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!