1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
12

Where can elicitation techniques be used?

Computers and Technology
1 answer:
Nikitich [7]3 years ago
3 0

Answer:

An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.

Explanation:

You might be interested in
The inflationary gap occurs when you obtain no increase in output, but only an increase in the Average Price Level from an incre
Dafna11 [192]
<span>B. Second phase of the Keynesian LRAS Curve.</span>
5 0
3 years ago
Which of the following can technology NOT do?
Gnesinka [82]

make our life problem free

because technology has its negative effects on humanity like Social media and screen time can be bad for mental health

And technology is leading us to sedentary lifestyles

Technology is addictive

Insomnia can be another side effect of digital devices

Instant access to information makes us less self-sufficient

Young people are losing the ability to interact face-to-face

Social media and screen time can be bad for mental health

Young people are losing the ability to interact face-to-face

Relationships can be harmed by too much tech use

4 0
3 years ago
Which of the following symbols would not be seen in the syntax for Java variables, methods, or arguments?
Taya2010 [7]

Answer:

??

Explanation:

?? is invalid syntax

When declaring or initializing variables names, and when writing methods, or arguments ?? is not used in Java .

() [] {} all these are used with variables , methods or arguments.

4 0
3 years ago
Select the correct answer.
Serga [27]

B: feasibility study

They are analyzing whether the project or application makes sense or is feasible, given the available resources, budget and projected monetary gains.

6 0
3 years ago
If you want to protect your identity while social networking, then you might use a(n) ____________ for your profile image
notsponge [240]
Won't you use a fake photo for your profile image or not put one on at all! This is a very safe way to keep your identity a secret and that you are very safe while you are online.

Hope this help!!
4 0
3 years ago
Other questions:
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • An engineer created three VSANs on the Cisco MDS switch. VSAN 100 is allocated to the marketing department, VSAN 110 is allocate
    10·1 answer
  • Fourlotts Corp. provide integrated services that include storing manufactured goods, packaging, and delivering it to the dealers
    13·1 answer
  • After creating the home page or any other page of a website and adding content to it, it must be displayed in a browser to view
    6·1 answer
  • Which command can be used to find errors on a hard drive​
    6·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • What is the status of this account?
    13·2 answers
  • Pleasee helpppppppppppppppppppppp me!
    7·1 answer
  • A customer in Lowe's needs help. Matt works in shipping and receiving. It isn't Matt job to work with the customer, but he knows
    15·2 answers
  • when an overridden method is called from within a subclass, it will always refer to the version of that method defined by the (a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!