1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
2 years ago
12

Where can elicitation techniques be used?

Computers and Technology
1 answer:
Nikitich [7]2 years ago
3 0

Answer:

An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.

Explanation:

You might be interested in
The conversion of decimal 0.0625 into its binary equivalent. Explain.
Rashid [163]
D. 0.0001.......first the zero before the decimal point is devided by 2....so it gives out 0 as a reminder so u right 0. at first then to do the part after decimal...first multiply 0.625 by 2 which gives out 0.125 as a fractional number so 0 would be the number after "0." ...and again the answer 0.125 is multiplied by 2 which gives out 0.25....so again we get a zero as an integer so now it would be "0.00..." ....again multiply 0.25 by 2 which gives out 0.5....again the integer is 0....so we add another 0 after 0.00....which would then become 0.000.....after that again multiply 0.5 by 2 which would give 1 as a result....as the fractional part is over, u need to stop here....so add that 1 after the 0.000 which gives 0.0001 as a final result.
4 0
3 years ago
Wendy Patel is entering college and plans to take the necessary classes to obtain a degree in architecture. Research the program
jeka57 [31]

Answer:

Follows are the solution to this question:

Explanation:

If Windy needs to study and be a specialist in graphic designing for machines, I'm going to provide a windy link of the machine with such a 64 bit, 3-GHz Intel or AMD processor with an 8 GB  RAM, an OpenGL 4.1 chip, an inter-button cursor, a right thumbstick, or a storage drive with GB at least.  

  • All above description for the computer is suitable for windy because you would well be aware throughout the graphic designing, that may be learned through iRhino 3D (iOS), Autocad, Magical Plan, Morphoio trace, etc if you'd like to graduation in architecture.
  • They require fast internet for each application, that can also be installed and installed, that  often requires a profile of all technical support programs as well as a web-only storage license.  
  • As many of the above applies also runs through an AMD or six-bit intel, but not on the ARM processor or instance  iRhino 3D (iOS) isn't consistent with an Embedded system, I will select the processor like an Intel or 3GHz AMD processor.
4 0
3 years ago
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
SOVA2 [1]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
5 0
3 years ago
Read 2 more answers
Which statement is true for slide or positive film?
Hitman42 [59]

Answer:

B.

Slides or positive films give high quality pictures with higher color saturation and contrast.

Explanation:

The above is true for slides with positive film. This is because, the positive film happens to have a high resolution when it was been used thereby giving out a high quality video at the end of the recording. The higher colour saturation and contrast are also an attribute of a slide  or positive film.

6 0
2 years ago
Can anybody answer this please hurry
Ludmilka [50]

Answer:

Ada Lovelace

The first one!

Hope this helps!

5 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following recursive method, which is intended to return a String with any consecutive duplicate characters removed.
    11·1 answer
  • How to turn a flash drive into a bluetooth adapter?
    13·1 answer
  • If a user receives a message whose tone and terminology seems intended to invoke a panic or sense of urgency, it may be a(n) ___
    13·1 answer
  • The sample remote access policy document from the hospital that you reviewed in the lab showed that the Remote Access Domain is
    15·2 answers
  • Select the correct text in the passage,
    10·1 answer
  • An F-1 ____________ may be authorized by the DSO to participate in a curricular practical training program that is an__________
    8·1 answer
  • Is an automatic computer check to ensure that the data entered is sensible and reasonable.It does not check the accuracy of data
    7·1 answer
  • Find the output<br>I need it immediately​
    15·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
  • Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!