Solved

Research Method in Computer Science

Posted on 1998-11-09
5
390 Views
Last Modified: 2010-05-18
What is the most important research method in computer science?  Why do you think it is the most important in comparison with other methods?
0
Comment
Question by:morgan1
5 Comments
 

Author Comment

by:morgan1
ID: 1012297
This question was given to me as graduation requirements for a masters degree in computer science.  The answer to this question may be included in my response to the professor.
0
 
LVL 2

Expert Comment

by:Laphroaig
ID: 1012298
Does qualification for a Masters Degree in Computer Science depend on your knowledge of the subject, or the initiative that you display in obtaining the correct answers to your Professor's questions with the minimum of effort on your part.

I would suggest that your personal integrity is in serious doubt here and that in the future, you will be unemployable in the IT industry, irrespective of whatever qualifications you fraudulantly obtained.


0
 
LVL 12

Expert Comment

by:mark2150
ID: 1012299
The most important research method in *any* field is the ability TO DO IT YOURSELF!

0
 

Author Comment

by:morgan1
ID: 1012300
Thank you for your comments, though this is not what I was expecting.  The initiative displayed here is misconstrued without all of the information.  The purpose in these questions is to do research and being able to express yourself.  This question has certainly done that.  I am not trying to find an 'easy' way out.  There is alot of information to go through, I am sorry you do not approve of my posting this question here.  I thought with the large expository in this forum, I would get some idea I had not come across, yet.  And also, in any research, you must quote where you found the info and whose idea it is.  Which I have done.  My professors are quite aware of my ideas and know when I am not being totally honest.  Beside, I am doing other research related to this question on the internet, which my professors strongly encourage.
Any answer posted here will only be one of many gleemed from other sources on the internet.  (White papers, technical documents etc.)
Also any research is enhanced with personal interviews, whether through electronic means such as experts exchange or in person.
0
 

Accepted Solution

by:
ComTech earned 0 total points
ID: 7019040
Time to close this abandoned question.

ComTech
CS @ EE
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This is about my first experience with programming Arduino.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

937 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now