1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
3 years ago
12

What are the methods used in research methodology?

Computers and Technology
1 answer:
earnstyle [38]3 years ago
5 0
Experiments. ...
Surveys. ...
Questionnaires. ...
Interviews. ...
Case studies. ...
Participant and non-participant observation. ...
Observational trials. ...
Studies using the Delphi method.
You might be interested in
What is the first step necessary to begin setting up a website once a host has been selected and paid?
NemiM [27]

Answer: Select a domain name

4 0
3 years ago
3. Run the C-LOOK algorithm (requests can only be serviced when the head is moving toward higher numbered tracks); the head is c
o-na [289]

Answer:

See explaination.

Explanation:

An algorithm is specifically defined as the step by step method or process of achieving any type of result.

Please kindly see the attached file for the C algorithm that fulfils the answer of the given problem.

3 0
3 years ago
CSc 2720 - Data Structures: Assignment 1 [100 points] How to Submit: Turn the .java file in Folder Assignment 1 in iCollege no l
gavmur [86]
Hehehwkwjhdhebfhshshwjbrbr
5 0
3 years ago
Python: Write a program that prompts the user for a meal: breakfast, lunch, or dinner. Then using if statements and else stateme
Alexeev081 [22]

The program prompts user for the time of meal they will be having and a suggestion made on their behalf. The program is written in python 3 thus :

meal= input('your meal : ')

<em>#prompts</em><em> </em><em>user</em><em> </em><em>to</em><em> </em><em>enter</em><em> </em><em>a</em><em> </em><em>meal</em><em> </em><em>type</em><em> </em>

if meal == 'breakfast' :

<em>#check</em><em> </em><em>if</em><em> </em><em>it's</em><em> </em><em>breakfast</em><em> </em>

print('How about some Avocado')

elif meal == 'lunch' :

<em>#checks</em><em> </em><em>if</em><em> </em><em>it's</em><em> </em><em>lunch</em><em> </em>

print('like some grapes?')

else:

print('would rice be ok?')

<em>A</em><em> </em><em>sample</em><em> </em><em>run</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>program</em><em> </em><em>is</em><em> </em><em>attached</em><em>.</em><em> </em>

<em>Learn</em><em> </em><em>more</em><em> </em><em>:</em><em>brainly.com/question/25531734</em>

8 0
3 years ago
When using a software budget, you should feel very confident if you choose a solution that looks like it will come in exactly on
ludmilkaskok [199]

Answer:

probably false

Explanation:

because u dont want a budget to b exact u want it completely covered

3 0
3 years ago
Other questions:
  • To add text into a SmartArt graphic, a user will need to _____.
    14·1 answer
  • Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hi
    7·1 answer
  • Dusk is considered “a magic hour” by photographers and is the time when light is the least harsh. True or false.
    12·2 answers
  • Program code that can be evaluated to a value is called a(n):__________
    12·1 answer
  • ________ did you sell your computer to?​
    9·1 answer
  • Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
    14·1 answer
  • Define foreign key. What is this concept used for?
    6·1 answer
  • 1. What is the difference between the wireless network that you provide to your customers versus the wireless network that you w
    5·1 answer
  • How to transfer word 2019 from one computer to another
    12·1 answer
  • The sum of these 9 numbers is 36. 2, 2, 6, 2, 1, 8, 7, 5, 3 What is the mean of these 9 numbers?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!