1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
3 years ago
13

Mention two strategies of collecting data​

Computers and Technology
1 answer:
melisa1 [442]3 years ago
7 0
Types of quantitative and qualitative data collection methods include surveys and questionnaires, focus groups, interviews, and observations and progress tracking.
You might be interested in
Jane wants to add a chart to her presentation so she’ll click the Insert tab and in the Images group, she’ll click the Chart but
kap26 [50]

(A. Stevie only) because You need to go the illustrations tab in order to click on the chart button.

Jane clicked on images tab so she was wrong.

Mark as brainlest plz :)

3 0
3 years ago
Please help!!!!!!! 50 POINTS!!!!
mrs_skeptik [129]

Answer:

A,D,C,B are the correct answers

Explanation:

Hope this helps:)

3 0
3 years ago
Which of the following statements is true of a time management plan?
Debora [2.8K]
Omg going to say B but I might be C
5 0
3 years ago
A company has recently learned of a person trying to obtain personal information of the employees illegally according to which a
wel
This is illegal. The person responsible for this could be sent to jail for a very long time. He should also be fired. 
7 0
3 years ago
What is the purpose of a macro in a word processor?
Natali [406]
C : to determine error rate
8 0
3 years ago
Read 2 more answers
Other questions:
  • Identify the correct software or hardware applications in the passage below
    10·1 answer
  • What differences in traffic patterns account for the fact that STDM is a cost-effective form of multiplexing for a voice telepho
    10·1 answer
  • A web application that is designed as a single piece of software with multiple features that are fully integrated into the main
    9·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • The valence electron configurations of several atoms are shown. how many bonds can each atom make without hybridization? 2s^2 2p
    12·1 answer
  • Create flowchart using Flowgorithm to represent the logic where the user inputs a number between 1 and 3 and displays the number
    7·1 answer
  • T.L.E
    6·1 answer
  • In your own words, describe invention.
    8·2 answers
  • Computer viruses and coding books
    6·1 answer
  • What is edge computing?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!