A Guide to Conducting Online Research by Ted J. Gaiser, Anthony E. Schreiner

By Ted J. Gaiser, Anthony E. Schreiner

A advisor to utilizing know-how in examine is designed to help scholars, teachers, and practitioner researchers in utilizing know-how as a part of their examine. The e-book starts off by means of what inquiries to ask and the way to arrange to behavior on-line examine, then concentrates on specific applied sciences and the way to hire them successfully, prior to concluding with a dialogue of the peculiarities of carrying out study within the on-line setting.

Show description

Read or Download A Guide to Conducting Online Research PDF

Similar computing books

Mathematical Foundations of Computer Networking

“To layout destiny networks which are invaluable of society’s belief, we needs to placed the ‘discipline’ of machine networking on a far improved beginning. This ebook rises above the significant trivia of today’s networking applied sciences to stress the long-standing mathematical underpinnings of the sphere.

Linux Server Hacks, Volume 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting

Put up 12 months notice: First released December twenty second 2005

Today's process directors take care of an unlimited variety of events, working structures, software program applications, and difficulties. those who find themselves within the understand have stored their reproduction of Linux Server Hacks shut handy to ease their burden. And whereas this is helping, it's now not adequate: any sys admin understands there are lots of extra hacks, cool assistance, and methods of fixing difficulties than can slot in a unmarried quantity (one that mere mortals can elevate, that is).

Which is why we created Linux Server Hacks, quantity , a moment number of awfully precious assistance and methods for locating and utilizing dozens of open resource instruments you could practice to resolve your sys admin difficulties. the facility and suppleness of Linux and Open resource signifies that there's an miraculous volume of serious software program available in the market ready to be utilized for your sys admin difficulties — if merely you knew approximately it and had sufficient info to start. therefore, Linux Server Hacks, quantity Two.

This convenient reference deals a hundred thoroughly new server administration suggestions and strategies designed to enhance your productiveness and sharpen your administrative talents. every one hack represents a smart solution to accomplish a selected job, saving you numerous hours of looking for the fitting resolution. not more sifting via guy pages, HOWTO web pages, or resource code reviews — the one source you would like is true the following. and also you don't need to be a approach administrator with enormous quantities of boxen to get whatever priceless from this booklet as the various hacks follow both good to a unmarried method or a house network.

Compiled by way of specialists, those hacks not just provide the step by step directions essential to enforce the software program, yet additionally they give you the context to actually aid you study the know-how.

Topics include:
• Authentication
• distant GUI connectivity
• garage management
• dossier sharing and synchronizing resources
• Security/lockdown instruction
• Log records and monitoring
• Troubleshooting
• method rescue, restoration, and repair

Whether they assist you recuperate misplaced information, acquire info from dispensed consumers, or synchronize administrative environments, the strategies present in Linux Server Hacks, quantity will simplify your existence as a approach administrator.

High Performance MySQL: Optimization, Backups, and Replication (3rd Edition)

How are you going to carry out MySQL’s complete energy? With excessive functionality MySQL, you’ll research complicated options for every thing from designing schemas, indexes, and queries to tuning your MySQL server, working process, and to their fullest power. This consultant additionally teaches you secure and useful how one can scale purposes via replication, load balancing, excessive availability, and failover.

Linux Voice [UK], Issue 25 (April 2016)

Approximately Linux Voice

Linux Voice is an autonomous GNU/Linux and loose software program journal from the main skilled reporters within the business.

About this issue

People try to damage into our desktops, yet we will struggle again. With honeypots and crafty, we trap attackers red-handed and discover what they're up to.

Plus: We delve into OwnCloud to determine what 2016 has in shop, proportion a espresso with pink Hat's leader group wrangler, and peek contained in the ELF dossier layout. Get extra from your Linux desktop in with our tutorials: display screen your health, construct 3D versions, create a 3D robotic, improve your web pages and rather a lot more.

Extra info for A Guide to Conducting Online Research

Example text

Your sign-in is called your Windows Live ID, and could be a Microsoft Passport, MSN Hotmail or MSN Messenger account. This sign-in is valid for all those services, as well as others such as Zune and Xbox Live. Currently 5 GB of mail storage are available, but these limits change with time. Yahoo! Mail is currently the free mail service with the largest user base. There is no limit on mail storage, but individual messages including attachments may be no larger than 10 MB. A Yahoo! account also provides access to Yahoo!

Org). The Mac OS X operating environment comes with the Apple Mail application included. Apple Mail can access e-mail using POP or IMAP. Beyond e-mail it integrates with other Apple applications such as Address Book, iChat and iCal. Microsoft Office for Mac OS X, includes a mail application called Entourage, which is intended to be similar in function to Outlook on Windows. It also includes some calendar, address book and organization functions. It has some integration with Microsoft Exchange, but not quite to the level of Outlook on the Windows platform.

But they are text files which can be read by a user or application. Microsoft mail clients like Outlook store their mail boxes in the PST (Personal Information Store) format. This is a binary format and not easy to access directly. The mail client would have to be used to save each message as text. The new Windows Mail in Vista does, however, save mail files as text files. qxp 2/5/2009 8:08 PM Page 47 USING EMAIL FOR DATA COLLECTION Having considered the public-face and behind-the-scenes aspects of email, now let us look at how email might be used for social research.

Download PDF sample

Rated 4.89 of 5 – based on 30 votes