1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
3 years ago
7

For what purposes do students collect data? Check all that apply.

Computers and Technology
2 answers:
Ulleksa [173]3 years ago
6 0

Answer:

1

2

3

4

Explanation:

Bumek [7]3 years ago
5 0

Answer:

sounds like all of the above

Explanation:

only one im not 100% sure on is to examine a question's reliablity

You might be interested in
The elements in a long array of integers are roughly sorted in decreasing order. No more than 5 percent of the elements are out
USPshnik [31]

Question Completion with Options:

a. Ill only.

b. I only.

c. II and III only.

d. I and II only.

e. Il only

f. I and Ill only.

Answer:

The best method to use to sort the array in descending order is:

e. Il only

Explanation:

The Merge Sort is similar to the Insertion Sort but, it is better with its sorting versatility.  It repeatedly breaks down a list into several sub-lists until each sub-list consists of a single element and then, merging the sub-lists in a manner that results in a sorted list.  The Merge Sort has been described as a "divide and conquer" technique because of how it splits a list into equal halves before combining them into a sorted whole.

8 0
3 years ago
When a browser is open on your computer, what browser tool is used to move the webpage to the previously viewed page on the brow
ch4aika [34]

Answer:

back arrow button

Explanation:

7 0
3 years ago
You find a list of numbers on the kitchen counter, but you aren’t sure what the numbers represent. This is an example of:
Pie

Answer:

I say that this would be data. It is the one that makes the most sense, because in math, that would be the data that you may not know what to do with....YET!! Hope this was helpful!

8 0
3 years ago
Read 2 more answers
Help please brainliest
V125BC [204]

Number one is x-axis.

3 0
3 years ago
someone who protects valuable online information, like phone numbers and passwords would be considered​
charle [14.2K]

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

6 0
3 years ago
Other questions:
  • List five types of system information that can be obtained from the windows task manager. how can you use this information to co
    5·1 answer
  • Cover page styles in the cover page gallery match the preformatted styles in word, making it easier to create a coherent style b
    5·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • Write a function square_evens(values) that takes a list of integers called values, and that modifies the list so that all of its
    9·1 answer
  • The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
    7·1 answer
  • How many characters should a strong password have? four six eight ten
    10·2 answers
  • Lisa is developing a Web application using a framework and wants to include interactive elements using JavaScript. She decides t
    10·1 answer
  • An algorithm is a step by step process that describes how to solve a problem and/or complete a task, which will always give the
    14·1 answer
  • How do you delete questions you asked?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!