answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
1 year ago
15

Your company wants to conduct an exploratory study to gain new insights into some product changes you are considering. Which typ

e of research method would be most appropriate for this exploratory study?
Computers and Technology
1 answer:
Lina20 [59]1 year ago
3 0

Answer: Primary Research (Focus Group).

Explanation:

Exploratory Research is an inquiry that seeks to understand the basic causal factors of a problem. This effort can serve as the basis of more intensive research later on.

There are basically two methodologies used, which are the; Primary and Secondary methods. While the Primary method's source of information is the concerned group, the Secondary Methods obtain their information from already existing information (Primary sources), such as Interviews, Journals, etc.

In the case of the company in the question, seeking to gain insight into the changes in a product, it would be best for them to consider what some selected costumers (focus group), think about the existing products and their views on subsequent changes. This method of getting information directly from the focus group employs the primary method.

You might be interested in
What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where woul
hjlf

Answer:

  • The difference between a policy, a standard and a practice is as follow:
  1. Policy: It can be defined as the written instructions that describe proper behavior.
  2. Standard: It can be defined as the detailed statement of what must be done to comply with policy.
  3. Practice: It can be defined as the examples of actions that would comply with policy.
  • The three types of security policies are:
  • Enterprise Information Sec. Policy (EISP) : High level policy that sets the strategic direction, scope, and tone for the organization's security efforts. Use: It is used to support the mission, vision and direction of the organization and sets the strategic direction, scope and tone for all security efforts
  • Issue Specific Sec. Policy (ISSP) : An organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies. Use: It is used to support routine operations and instructs employees on the proper use of these technologies and processes
  • System Specific Sec. Policy (SysSP): Organizational policies that often function as standards or procedures to be used wen configuring or maintaining systems. SysSPs can be separated into two general groups-managerial guidance and technical specifications- but may be written as a single unified document. Use: It is used as a standard when configuring or maintaining systems.
  • ISSP policy would be needed to guide the use of the web, email and use of personal use of office equipment.

3 0
1 year ago
Drag each tile to the correct box.
garri49 [273]
I think select the video insert select the movie option under illustrations resize the video player then select the insert tab i’m not 100 percent sure tho
8 0
2 years ago
Read 2 more answers
What makes you normally visit the site-graphics, layout, or content? Why?​
Vinvika [58]

Answer:

robux

Explanation:

robux

8 0
1 year ago
Read 2 more answers
An executive in a computer software firm works with his office door closed. At the same time every hour he opens the door to see
Masja [62]

Answer: (A) Fixed interval

Explanation:

 The fixed interval schedule is the type of schedule of the reinforcement in the operand conditioning in which the the initial response are rewarded by some specific amount of the time.

The main issue with the fixed interval schedule is that the people have to wait until the reinforcement schedule get occur and start their actual response of interval. This type of reinforcement schedule occur as the output value does not posses constant value all the time.

Therefore, Option (A) is correct.

4 0
2 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
2 years ago
Other questions:
  • vertical exchanges are typically used only to buy and sell materials required for an organization's support activities ( True or
    14·2 answers
  • The Pentium 4 Prescott processor, released in 2004, had a clock rate of 3.6 GHz and voltage of 1.25 V. Assume that, on average,
    8·1 answer
  • Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturin
    15·1 answer
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • 11.19 LAB: Max magnitude Write a function max_magnitude() with two integer input parameters that returns the largest magnitude v
    7·1 answer
  • Your employer, yPlum Corporation is manufacturing two types of products: Mirabelle smartphone, and Blackamber laptop. The compan
    14·1 answer
  • An author is preparing to send their book to a publisher as an email attachment. The file on their computer is 1000 bytes. When
    6·1 answer
  • Write code which takes a sentence as an input from the user and then prints the length of the first word in that sentence.
    6·1 answer
  • Value is always _____________ aligned in a cell. ​
    11·1 answer
  • Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!