Programmable Logic Controllers (PLCs) are a type of digital computer that is designed for automation and control purposes.
The main functions of PLCs include monitoring, controlling, and automating industrial processes and machinery. They are highly reliable and cost-effective and can be programmed to perform a wide range of tasks.
Advantages of PLCs:
1. High Reliability: The use of programmable logic controllers in automation and control applications results in highly reliable and stable operations.
2. Cost-Effective: PLCs are cost-effective solutions for automation and control applications.
3. Flexible and Versatile: PLCs can be programmed to perform a wide range of tasks, and their functions can be modified easily.
4. Easy to Troubleshoot: The modular design of PLCs makes them easy to troubleshoot and maintain.
Disadvantages of PLCs:
1. Limited Processing Power: PLCs have limited processing power compared to other types of digital computers.
2. Limited Memory Capacity: PLCs have limited memory capacity, which can limit the complexity of tasks they can perform.
3. Complexity: The complexity of programming PLCs can be a disadvantage for some users.
4. Individual Components of a PLC: A PLC consists of several individual components that perform specific functions.
Learn more about Programmable Logic Controllers here:
https://brainly.com/question/32508810
#SPJ11
Tema: LA CIENCIA Y SUS APORTES AL MEJORAMIENTOO TÉCNICO SEGUNDO GRADO SECUNDARIA 1.¿Cuál es el inicio de los procesos técnicos y científicos? 2. En la actualidad ¿ De que están hechas la mayoría de las construcciones? 3.¿Que material usaron en la construcción de sus pirámides de los teotihuacanos? 4.Este material de construcción es artesanal, no contamina, es térmico y está hecho con tierra y paja.
Answer:
1. El inicio de los procesos técnicos y científicos es la realización de observaciones objetivas y basadas en hechos previos o recurrentes y verificables como verdaderas o falsas por otros observadores.
2. La mayoría de los edificios de hoy en día están hechos de hormigón que consiste en cemento adherido en una proporción fija con agregados, que se pueden moldear en la forma deseada cuando se convierten en una lechada. El agua del proceso de poro se evapora fácilmente y el hormigón se seca después de varios días para formar una estructura sólida de la forma deseada.
3. El material utilizado en la construcción de las pirámides de Teotihuacanos incluye una roca volcánica, conocida como tezontle tallada
4. Un material de construcción artesanal que no contamina, es térmico y está hecho con tierra y paja es el adobe
Un adobe consiste en una mezcla de paja, arena y arcilla, así como otros materiales fibrosos que se secan al sol después de moldear la mezcla en ladrillos.
Un adobe tiene una alta capacidad calorífica y, por lo tanto, una habitación con paredes de adobe se mantiene fresca en climas cálidos, mientras que en climas fríos, la pared de adobe libera calor lentamente para mantener la habitación caliente
Explanation:
3.2 Code Practice: Question 1 from edhesive ( answer in python pls)
Answer:
value = float(input("Enter a number: "))
if value > 45.6:
print("Greater than 45.6")
What process should be followed while giving a reference?
sam
A company makes a profit of $50 per software program and $35 per video game. The company can produce at most 200 software programs and at most 300 video games per week. Total production cannot exceed 425 items per week. How many items of each kind should be produced per week in order to maximize the profit?.
200 pieces of software and 235 games should be created each week in order to optimize earnings.
What does "software" actually mean?
Software is a set of guidelines, facts, or programs that direct computers to perform specific tasks.
The antithesis of software is hardware, which refers to a computer's external parts. The term "software" refers to all programs, scripts, and other operations that take place on a device.
Let
x ------> the number of software program
y -----> the number of video games
we know that
x ≤ 200 .......... inequality A
y ≤ 300 ......... inequality B
x + y ≤ 435 ......... inequality C
Using a graphing tool
The solution is the shaded area between the positive values fo x and y
see the attached figure
The vertices of the shaded area are
(0,0),(0,300),(135,300),(200,235),(200,0)
The profit function is equal to
P = 50x + 35y
Substitute the value of x and the value of y of each vertices in the profit function
For (0,300) ----- P = 50(0) + 35(300) = $10,500
For (135,300) ----- P = 50(135) + 35(300) = $17,250
For (200,235) ----- P = 50(200) + 35(235) = $18,225
For (200,0) ----- P = 50(200) + 35(0) = $10,000
therefore
Every week, 200 pieces of software and 235 video games should be generated in order to optimize earnings.
Learn more about Software
brainly.com/question/985406
#SPJ4
What is the principle where all data should be treated equally?
The principle of data equality states that all data should be treated with equal respect, free from bias and discrimination, for fair and reliable analysis.
The principle that all data should be treated equally is known as the principle of "data equality." This principle holds that all data, regardless of its source or format, should be treated with the same level of respect and given equal consideration in processing and analysis. This means that data should not be subjected to bias or discrimination based on factors such as its origin, type, or format, and should be processed and analyzed in a consistent and impartial manner. The principle of data equality is an important consideration in fields such as data science, where it is critical to ensure that data is treated objectively and fairly in order to produce accurate and reliable results.
Adhering to the principle of data equality helps to ensure the validity and integrity of the data, leading to more trustworthy and actionable insights and decisions based on the analysis.
Learn more about integrity of the data here:
https://brainly.com/question/28863007
#SPJ4
what must a fire department's health and safety program address
A fire department's healthcare and safety program must address various aspects to ensure the well-being and protection of its personnel.
Here are some key areas that such a program should address:
1. Occupational Hazards: The program should identify and address potential occupational hazards specific to firefighting, such as exposure to smoke, hazardous materials, physical injuries, and psychological stress. It should include measures for hazard recognition, prevention, and control.
2. Personal Protective Equipment (PPE): The program should outline guidelines for the selection, maintenance, and proper use of PPE, including helmets, protective clothing, gloves, masks, and respiratory protection, to safeguard firefighters from workplace hazards.
3. Medical Fitness: It should establish standards for medical fitness assessments, including physical examinations and fitness tests, to ensure that firefighters are physically capable of performing their duties safely.
4. Training and Education: The program should provide comprehensive training and education on firefighting techniques, emergency response protocols, equipment operation, risk assessment, and safety procedures to enhance the knowledge and skills of firefighters.
5. Wellness and Rehabilitation: It should address programs for promoting firefighter wellness, including fitness programs, mental health support, critical incident stress management, and rehabilitation services to aid in recovery after physically demanding operations.
6. Incident Reporting and Investigation: The program should outline procedures for reporting and investigating incidents, accidents, near-misses, and injuries to identify root causes, implement corrective actions, and prevent future occurrences.
7. Safety Culture: The program should foster a safety culture that encourages proactive safety practices, open communication, continuous improvement, and accountability at all levels within the fire department.
Learn more about healthcare :
https://brainly.com/question/12881855
#SPJ11
Because each of n bits of a number x must be multiplied by each of n bits of a number y, the best big - O bound that any algorithm that multiplies two n-bit numbers can achieve is Q(n + 1) = 2(nº). (True or False)
False. The given statement is incorrect. The best big-O bound for multiplying two n-bit numbers is actually O(n^1.585) using Karatsuba's algorithm, not 2(nº) as stated in the question.
The I/O bound state has been identified as a problem in computing almost since its inception. The Von Neumann architecture, which is employed by many computing devices, this involves multiple possible solutions such as implementing a logically separate central processor unit which along with storing the instructions of the program also retrieves actual data usually from main memory and makes use of this more accessible data for working. When the process is terminated it writes back the results to the original storage (usually the main memory).
Since data must be moved between the CPU and memory along a bus which has a limited data transfer rate, there exists a condition that is known as the Von Neumann bottleneck. Put simply, this means that the data bandwidth between the CPU and memory tends to limit the overall speed of computation. In terms of the actual technology that makes up a computer, the Von Neumann Bottleneck predicts that it is easier to make the CPU perform calculations faster than it is to supply it with data at the necessary rate for this to be possible.
learn more about Karatsuba's algorithm here:
https://brainly.com/question/31064504
#SPJ11
A database management system (DBMS) is a program, or collection of programs, through which users interact with a database. Popular DBMSs include Access, Oracle, DB2, MySQL, and SQL Server. Access currently is the most popular DBMS for use with personal computers. There are versions of Oracle, DB2, MySQL, and SQL Server that run under Windows, Unix, and Linux as well as mainframe operating systems. Pick a DBMS and research its strengths and weaknesses. If you have had experience with one or more, provide insight on what you think it is best designed for and which areas are lacking. Why would one choose one DBMS over another
One popular DBMS is Oracle Database. Oracle Database is known for its robustness, scalability, and comprehensive feature set, making it suitable for enterprise-level applications. It is widely used in large organizations and industries where data management and reliability are critical, such as finance, telecommunications, and government sectors.
Strengths of Oracle Database:
Performance: Oracle Database is designed to handle large volumes of data efficiently and deliver high-performance query processing.
Scalability: It can scale horizontally and vertically to accommodate growing data needs and handle increasing user loads.
Security: Oracle Database offers advanced security features, including encryption, authentication, and access control mechanisms to protect sensitive data.
Reliability: It provides built-in features like backup and recovery, high availability, and data replication to ensure data integrity and minimize downtime.
Extensibility: Oracle Database supports a wide range of data types, data models, and programming languages, making it versatile for different application requirements.
Advanced analytics: It offers powerful analytics capabilities, including data mining, predictive analytics, and machine learning algorithms.
Weaknesses of Oracle Database:
Cost: Oracle Database is known to have higher licensing and maintenance costs compared to some other DBMS options.
Complexity: Oracle Database has a steep learning curve and can be complex to administer and manage, requiring skilled database administrators.
Resource-intensive: It may require significant hardware resources and memory allocation to achieve optimal performance.
Closed-source: As a proprietary DBMS, Oracle Database has limited transparency and customization options compared to open-source alternatives.
Choosing a DBMS depends on various factors, including the specific requirements of the application, budget, scalability needs, security requirements, and available expertise. Oracle Database is often chosen for mission-critical enterprise applications that require high scalability, performance, and reliability. However, for smaller-scale applications or projects with budget constraints, open-source DBMSs like MySQL or PostgreSQL may be preferred due to their lower cost and simplicity. Additionally, the choice may also depend on the existing technology stack, compatibility with other systems, and community support.
To learn more about telecommunications : brainly.com/question/3364707
#SPJ11
Determine what is printed by the following code.
1
p = 2
4
ولا نا ا لا لا لا
y + 2
i-y
DISPLAY()
DISPLAY(P)
DISPLAY(y)
The following code printed by this is IPU.
What is Code?Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples.
Text created in markup or style languages like HTML and CSS (Cascading Style Sheets) is also referred to as code in less formal contexts. As an illustration, you might hear people refer to code as "C code," "PHP code," "HTML code," or "CSS code."
Code in a word processing document may refer to formatting symbols that aid format a document's overall presentation. The code> tag in HTML indicates that a passage of text is computer code.
Therefore, The following code printed by this is IPU.
To learn more about Code, refer to the link:
https://brainly.com/question/31228987
#SPJ7
Describe an association or rhyming phrase you have used to remember information. Was this a useful technique for you? Why or why not?
Answer:
I used the names George Clooney and Tim Allen to remember the pairs of nitrogenous bases in DNA.
Explanation:
DNA is composed of nucleotides, however the nucleotides are formed by nitrogenous bases called Adenine, Guanine, Cytosine and Thymine. Each nucleotide has a nitrogenous base, but these bases form pairs, allowing the nucleotides to come together. The pairs are formed solely by Timine and Adenine or Guanine and Cytosine.
As I needed to remember the formation of the pairs to do my biology test, I associated the first letter of each base, with the initials of two famous names.
As Guanina is paired with Cytosine (G-C), I associated this pair with the initial letters of the name George Clooney. As Timina is paired with Adenina (T-A), I associated this pair with the initials of the name Tim Allen.
What is a benefit of using a client/server network?
Cheap to maintain
Easy to install
Has a central, powerful computer
Unable to share files
Answer:
Has a central powerful computer
Explanation:
When operating a client - server network, a certain access mediun is created such that clients can access information, materials and services from a central computer, this poses great advantage in the area of security and control. Clients would be able to gain access from this central computer using either a local or wide area network. The accessibility provided through this powerful, central computer allows the the network to monitor what actions are being performed and make appropriate restrictions on the network, hence, preventing the invasion of malware and viruses. Hence, the central control is a great feature of a client - server network.
computer is a major source of informarion why
Answer:
The answer to this question is given below is the explanation section.
Explanation:
Computer can process and store data.It can easily store large amount of data and process the data very fast but it is not the source of information it serve as a store of information because it store information and whenever we need any information we can retrieve that information from computer memory.in this way computer is s source of information.
how many layer masks can a single layer have photoshop
In Photoshop, a single layer can have multiple layer masks. There is no specific limit to the number of layer masks that can be applied to a single layer. Layer masks are used to hide or reveal specific parts of the layer, and multiple layer masks can be used to make complex edits or adjustments to the layer.
Each layer mask is represented by a black and white thumbnail in the Layers panel. The white areas of the layer mask reveal the layer, while the black areas hide it. Additionally, layer masks can be painted on using brushes or other selection tools to refine the mask's edges or reveal additional areas of the layer.
To learn more about areas click here: brainly.com/question/30307509
#SPJ11
in many applications like social media, the app suggests the list of friends that a particular user may know. it may be used on a system that has over a billion users. which algorithm is best to implement this feature?
The most commonly used algorithm to implement this feature is the collaborative filtering algorithm. It is a memory-based algorithm that uses the past interactions of users to recommend items to them.
Algorithm can be used to handle a large number of users and scale well with an increasing number of users. Another popular algorithm is the item-based collaborative filtering algorithm that uses the similarity between items to make recommendations. Additionally, Hybrid approach which combined the above two methods and some other algorithms like content-based filtering and knowledge-based filtering is also widely used.
Learn more about algorithm: https://brainly.com/question/22984934
#SPJ4
1.How is the Query wizard used on a table?
2.How is the form command used to create forms for a table?
3.How is the form created if we choose to use "split form"option?
4.What are the types of the form available ,if we use the"form wizard"?
5.How can we use the "Report wizard" to generate report of a table?
1. The Query Wizard is used on a table to easily create queries that extract specific data by guiding users through a series of steps to define fields, criteria, and sorting options.
2. The Form command is used to create forms for a table by automatically generating a layout based on the table's structure, allowing users to input or view data.
3. When using the "Split Form" option, a form is created with two views: a datasheet view displaying the table's records and a single record view for editing or adding data. These views are synchronized, making data manipulation efficient.
4. The "Form Wizard" offers various form types, including columnar, tabular, datasheet, and justified forms, allowing users to customize the layout according to their needs.
5. The "Report Wizard" generates reports of a table by guiding users through selecting fields, grouping levels, and sorting options, resulting in a professionally formatted report for data analysis or presentation.
learn more about Query Wizard here:
https://brainly.com/question/29306855
#SPJ11
What is the term for a male reproductive cell?
Answer:
I believe it is a sperm cell.
Explanation:
Not a sex cell because that can apply to both female and male reproduction.
Determine and plot the magnitude and phase spectra of the following signals: (a) x1(t)=(1−t2)[u(t)−u(t−1)]. (b) x2(t)=e−3∣t∣sin2πt,
(a) The magnitude spectrum of x1(t) is 4π^2ω, and the phase spectrum is -π/2.
(b) The magnitude spectrum of x2(t) is π / |ω + 3|, and the phase spectrum is π/2.
To determine and plot the magnitude and phase spectra of the given signals, we need to perform the Fourier transform of each signal. The magnitude spectrum represents the amplitude of each frequency component, while the phase spectrum represents the phase shift of each frequency component.
(a) Signal x1(t) = (1 - t^2)[u(t) - u(t - 1)]:
To find the Fourier transform of x1(t), we can apply the properties of the Fourier transform and use the time-shifting property and the frequency-shifting property.
The Fourier transform of (1 - t^2) can be obtained using the properties of the Fourier transform and the derivative property:
F{(1 - t^2)} = jωF{t^2} = jω(2πδ''(ω)) = -4π^2ω^2δ(ω),
where δ(ω) is the Dirac delta function.
The Fourier transform of u(t) - u(t - 1) can be obtained using the time-shifting property:
F{u(t) - u(t - 1)} = e^(-jωτ)F{u(t)} = e^(-jωτ) / (jω),
where τ is the time delay, which is 1 in this case.
Combining the two Fourier transforms, we get the Fourier transform of x1(t):
X1(ω) = -4π^2ω^2 * e^(-jω) / (jω) = -4π^2ω * e^(-jω) / j,
where X1(ω) is the Fourier transform of x1(t).
To plot the magnitude and phase spectra, we can express X1(ω) in polar form:
X1(ω) = |X1(ω)| * e^(jφ),
where |X1(ω)| is the magnitude spectrum and φ is the phase spectrum.
The magnitude spectrum is given by:
|X1(ω)| = |-4π^2ω * e^(-jω) / j| = 4π^2ω.
The phase spectrum is given by:
φ = arg(X1(ω)) = arg(-4π^2ω * e^(-jω) / j) = -π/2.
Therefore, the magnitude spectrum of x1(t) is 4π^2ω, and the phase spectrum is -π/2.
To plot the spectra, we can vary the frequency ω and compute the corresponding values of the magnitude and phase spectra. Then, we can plot them on a graph to visualize the frequency content and phase characteristics of the signal x1(t).
(b) Signal x2(t) = e^(-3|t|) * sin(2πt):
Similarly, we can find the Fourier transform of x2(t) by applying the properties of the Fourier transform.
The Fourier transform of e^(-3|t|) can be obtained using the properties of the Fourier transform:
F{e^(-3|t|)} = 1 / (jω + 3),
where ω is the frequency.
The Fourier transform of sin(2πt) is given by:
F{sin(2πt)} = jπ * [δ(ω - 2π) - δ(ω + 2π)].
Combining the two Fourier transforms, we get the Fourier transform of x2(t):
X2(ω) = (1 / (jω + 3)) * jπ * [δ(ω - 2π) - δ(ω + 2π)].
To plot the magnitude and phase spectra, we can express X2(ω) in polar form:
X2(ω) = |X2(ω)| * e^(jφ),
where |X2(ω)| is the magnitude spectrum and φ is the phase spectrum.
The magnitude spectrum is given by:
|X2(ω)| = |(1 / (jω + 3)) * jπ * [δ(ω - 2π) - δ(ω + 2π)]| = π / |ω + 3|.
The phase spectrum is given by:
φ = arg(X2(ω)) = arg((1 / (jω + 3)) * jπ * [δ(ω - 2π) - δ(ω + 2π)]) = π/2.
Therefore, the magnitude spectrum of x2(t) is π / |ω + 3|, and the phase spectrum is π/2.
To plot the spectra, we can vary the frequency ω and compute the corresponding values of the magnitude and phase spectra. Then, we can plot them on a graph to visualize the frequency content and phase characteristics of the signal x2(t).
To learn more about phase spectra, click here: brainly.com/question/30645323
#SPJ11
CALCULATE THE MECHANICAL ADVANTAGE (MA).
DATA: F= 135 kg; b= 4*a; L=15 m
The mechanical advantage (MA) of the lever system in this scenario can be calculated by dividing the length of the longer arm by the length of the shorter arm, resulting in an MA of 4.
To calculate the mechanical advantage (MA) of the lever system, we need to compare the lengths of the two arms. Let's denote the length of the shorter arm as 'a' and the length of the longer arm as 'b'.
Given that the longer arm is four times the length of the shorter arm, we can express it as b = 4a
The mechanical advantage of a lever system is calculated by dividing the length of the longer arm by the length of the shorter arm: MA = b / a.
Now, substituting the value of b in terms of a, we have: MA = (4a) / a.
Simplifying further, we get: MA = 4.
Therefore, the mechanical advantage of this lever system is 4. This means that for every unit of effort applied to the shorter arm, the lever system can lift a load that is four times heavier on the longer arm.
For more such question on system
https://brainly.com/question/12947584
#SPJ8
The complete question may be like:
A lever system is used to lift a load with a weight of 135 kg. The lever consists of two arms, with the length of one arm being four times the length of the other arm. The distance between the fulcrum and the shorter arm is 15 meters.
What is the mechanical advantage (MA) of this lever system?
In this scenario, the mechanical advantage of the lever system can be calculated by comparing the lengths of the two arms. The longer arm (b) is four times the length of the shorter arm (a), and the distance between the fulcrum and the shorter arm is given as 15 meters. By applying the appropriate formula for lever systems, the mechanical advantage (MA) can be determined.
........... is a network of network around the world
Answer: Global network
Explanation:
A global network expands the entire world. Connecting networks from all around together, not just in one state but countries and continents as well.
Multiple TCP streams can distinguished on a given machine using.
Select one:
a. network interface cards
b. All of the mentioned ,t. c. Ports
0 d. DNS addresses
The correct answer is option c. Ports.
Multiple TCP streams can be distinguished on a given machine using ports. In TCP/IP networking, ports are used to identify specific applications or services running on a device. Each TCP stream is associated with a unique combination of source and destination ports, allowing the system to differentiate between multiple concurrent connections.By using different port numbers for each TCP stream, the operating system can correctly route incoming packets to the corresponding application or service, ensuring that the data is delivered to the correct destination.
Learn more about TCP here:
https://brainly.com/question/27975075
#SPJ11
The culture of the Internet is interlinked in dependence between technological advances and the way in which ____.
humans increased personal capacity by using these advances
humans have become entirely dependent on digital technology
humans increased their processing knowledge with technology
humans have become interdependent on various technologies
Answer: humans increased personal capacity by using these advances.
Explanation:
The culture of the Internet is interlinked in dependence between technological advances and the way in which humans increased personal capacity by using these advances.
Technological advancement has to do with how information is being generated which brings about the improvement and inventions regarding technology.
Answer:
C) humans increased personal capacity by using these advances
Indentation is useful to make the document easier to read. To increase the indentation of the paragraph, you press the increase indentation in the ____________ tab.
AView
B.Insert
C.Review
D.Home
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct answer is Home.
Indentation is useful to make the document easier to read. To increase the indentation of the paragraph, you press the increase indentation in the Home tab.
you can increase/ decrease indentation in Home tab under the Paragraph groups of command.
Othe options are not correct because:
View tab has settings related to how the document looks like. Insert tab has settings related to the insertion of image, shape, pages, tables, illustration, and links, etc into a document. The review tab allows you to review the document with different available settings.
what type of attribute is a zip code data mining
Zip codes are usually considered categorical attributes in data mining.
A categorical attribute is an attribute that is usually represented by a finite number of categories or distinct values. This means that zip codes can be considered a categorical attribute since they are usually represented by a finite number of categories or distinct values.The term categorical variable refers to a variable that may be split into two or more classifications.
This term is frequently employed in statistical analysis, in which data is usually divided into two or more classifications or categories. Variables with categories are categorical variables. In data mining, a categorical variable is a type of attribute that is usually represented by a finite number of categories or distinct values.
You can learn more about data mining at
https://brainly.com/question/30395228
#SPJ11
I need anyone's help so please do so!
Do some research online about plasmapheresis. Then write a paragraph explaining what it is and in what kind of situation it would be useful to a patient.
Hi! Is anyone really good at making pretty schedules and designs? I don't have any money, but I could give points. I'll give a small number of points on this answer, but if you make the schedule I'll give you lots of points! (I'll send you the actual parts of the schedule I just need someone to make it look pretty) Thank you so much!
What hardware components are generally required for a desktop computing system?
Discuss briefly four types of websites and the criteria you will use to evaluate the content of a website
Answer: I would look at who made it, what date it was published, what it is about and if it says .gov, .com or etc.
Explanation:
When heating a substance a phrase change will start to occur when the kinetic energy of the particles is blink the attractive forces between the particles
Answer:
great enough to overcome.
Explanation:
Kinetic energy can be defined as an energy possessed by an object or body due to its motion.
Mathematically, kinetic energy is given by the formula;
Where, K.E represents kinetic energy measured in Joules.
M represents mass measured in kilograms.
V represents velocity measured in metres per seconds square.
A conductor can be defined as any material or object that allows the free flow of current or electrons (charge) in one or more directions in an electrical circuit. Some examples of a conductor are metals, copper, aluminum, graphite, etc.
When heating a substance, a phase change will start to occur when the kinetic energy of the particles is great enough to overcome the attractive forces between the particles.
Basically, the phase change includes solid, liquid and gas.
At which track meet did two runners finish in a time equivalent to the mode?
Answer:
1
Explanation:
edge
Answer:
3
Runner B
Runner C
5:30.5
Explanation:
To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
do first is
get on her computer to search the topic
make a list of the books she could use.
ask her teacher for specific suggestions.
make a list of relevant sources to check out
Answer:
The correct option is D)
Explanation:
To get information about a research topic the first thing to do is make a list of relevant sources.
Georgias sources would depend on the type of research she has been asked to conduct.
If it's primary research, she would collect information from:
Her own experienceHer own observationthe Information she gathers personally from other peopleIf it is secondary research, she can look at
books (hard copy, e-copy)journals (online, offline)online (blogs, videos, websites etc)Whilst looking online, it is important to stick to authoritative sources as it is possible for anyone to publish anything online.
Examples of reliable sources are:
Journals from Industry AssociationsBureaus of StatisticsGlobal Research CompaniesHigher Institutions e.t.c.Cheers!
Answer:
D
Explanation:
Edge 2021