JNU Business Intelligence Real-World Application of BI Discussion

DiscussionHow would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI. Reply 1:-Business intelligence (BI) uses programming ANd administrations to vary data into vital insight that develop an organization’s key and strategic business selections. Business intelligent practicality gets to and investigate information sets and to gift analytical findings in reports, synopses, dashboards, diagrams, graphs and maps to furnish shoppers with purpose by purpose data concerning the condition of the business. Despite of the actual factthat business intelligence doesn’t guide business shoppers or what is going to occur on the off probability that they take a selected step, neither is Business intelligencewith regards to making reports. Maybe, Business intelligenceoffers a path for people to seem at data to understand patterns and infer bits of information. within the current market we’ve excess of vendors United Nations agency area unit providing Business intelligencetools, from thatorganizations will opt for what they require. Microsoft, Qlik and Tableau Business intelligence tools area unit thought-about because the leaders and area unit principally employed by several corporations. Moreover Seattle-based coffee chain Starbucks is one in every of the foremost outstanding users of Business intelligence tools. Through its outstanding Loyalty Card program, Starbucks will hoard personalised get data on an enormous variety of shoppers. Utilizing this information and business data programming, the massive coffee organization would then be ready to anticipate what buys and offers a private shopper is perhaps progressing to be keen on. Apparently, the corporate advises the shoppers of all the offers, that they believe the client are inquisitive about. BI technology revolutionized and created tons of impact on however the organizations operate and fostered the expansion by anticipating the trends. Reply 2:-Many organizations use the technology of Business Intelligence (BI) which is a technology driven process in order to analyze the data to present the data with the actionable details. These information will help the managers, executives and corporate end users to view the information and make certain decision over the business (Moreno, Silva, Ferreira, Filardi, 2019). Thera re wide variety of tools includes for the BI and also the applications and other methodologies which allow companies to retrieve data from the internal processors. The data which has been retrieved from the internal systems and also the external sources will prepare the analysis (Kretzer Maedche, 2018). The analysis done by developing queries and run queries against the retrieved data which allows the implement the reports, data visualizations, and dashboards. These data visualizations give analytical results for the companies to take decisions and also use for operational workers. The companies able to use combine the data sets along with the BI tool such as querying, ad hoc analyzes, enterprise reporting, OLAP, operational BI, Mobile BI, SAAS, location intelligence, etc.As an example of the companies who uses the Business Intelligence technology is Starbucks. It’s a Seattle-based coffee chain who uses the BI via the program of loyalty card. They were able to collect the data which is related to individualized purchases on million customers. The information helped them to predict what items been purchased and offers a customers are mostly interested in. By getting this information, Starbucks able to give offers to the customers for them to take advantage of the offer more and also by using their mobile devices. This attracts the new customers also the customers who are already registered. It helps draw the customers more to stores very frequently and also helps the business to higher the sales. The Starbucks uses the CRM system and the company has combined the CRM system along with the BI to have the more effective information out of their data.

Did you know? hardware and software (discussion)

 
Initial Post: Respond to each prompt below.

Describe one hardware component that are essential to YOU as a consumer. Provide three options (brand, style, etc.) for the component.
Offer two new or interesting details about hardware and software from the consumer report. Write one question that you have about technology after reading the consumer report.

Example:
 
1.A hardware that I find very important and that we tend to forget is a printer. Especially the all –in-one printer that we can generally see in most electronic stores. Even though the trend is to go paperless, the majority of us cannot follow it. As a student, I need to print and scan papers few times a week, therefore an all-in-one printer is very essential for me.
Brand:There are too many brands out there that produce an all-in-one printer, but the most popular ones are: Canon, HP, Brother, and Samsung. I personally go with Brother, because compared to the other brands, Brother focuses in producing printers. Canon, HP, and Samsung all produce other electronic products.
Price:I take a quick look on Brother’s Website and an all-in-one printer’s price varies from $79.99 to $599.99. Of course, students or households don’t need to buy an expensive one. The $79.99 one is more than perfect and will last long if well taking care of. Also, many retail store may sell them at a lower price.
Features:An all-in-one printer gives you not only the possibility to print, but also to scan and to fax. Most them can print on different types of paper and also recto-verso. Scanning on these machines can be made by deposing the paper on the top tray or by placing the paper in the glass flatbed inside of the printer. Faxing is not as popular as it was before because of emails, but it can be something useful depending on the situation. To fax, paper has to be placed on the top tray and a phone number has to be entered on the keypad. One important feature that many people forget about is the possibility to connect the printer to Wi-Fi. This option is a must in today’s world because it let’s use print or scan from anywhere and from any device as long as we are connected to the same Wi-Fi. For example, I can print a document from my smartphone or tablet wirelessly.
2.After reading the Consumer Report about the all-in-one printers, I learned that it used a certain type of printing and I found out that an application to let us print from our smartphone or tablet is already downloaded in our devices.
Printing type:There are different types of printing and this product uses a a printing type named “Inkjet”. Inkjet prints paper by deposing droplets of ink on the paper instead of speaking it like other printers. It was interesting to see that this method of printing is very efficient. It takes less time for the ink to dry and it uses less ink than other printing procedures.
App:Imagine that we are reading an interesting article on your tablet and that we decide we want to print it. Normally, we would send the link of the article to our email, open the link from a computer, and then print the article. With the applications Apple AirPrint and Google Cloud Print already installed in our iOS or Android device, we can simply click on a button and our article gets printed. We don’t need to deal with the struggle of downloading the app or go through a third party application.
Question:After reading the Consumer Report and people reviews, I realized that printers are becoming less used with time. I wonder if it will stay among us or if it will join the floppy dick and the DVD player?

Discussion board: religion and work

RELIGION AND WORK by Carol  P. Harvey
Assumption College
In todays global society, it is useful to learn more about the religions that may be practiced by coworkers. Without some knowledge, individuals may attribute incorrect meanings to others behaviors. In addition, organizations may have policies and practices that inadvertently conflict with their employees religious beliefs. For example, some organizations do not allow vacation time to be accrued, thus preventing pilgrimages that may require a month of leave. Others require all workers to take Christian holidays and do not capitalize on the opportunity to have non-Christians work on days that have no significance to them. Jewish employees, for example may choose to work on Christmas Eve in exchange for having Yom Kippur off with pay. Because many individuals may be reluctant to discuss their religion or to explain its practices in a work setting, misunderstanding of behavior can result.
The following scenarios depict workplace incidents in which others are not aware of the religious basis for the individuals behavior. In each case, the employee is put in the limelight because of his/her religion. The supervisor or coworker, who has little or no knowledge of the religious practices that are at the root of these actions, may attribute an incorrect reason for the behavior that they see. These scenarios illustrate that lack of knowledge can lead to conflict, decreased productivity, and diminished motivation for workers as well as managers.
DIRECTIONS      
Each scenario illustrates the intersection between religion and the work­place. Pick one scenario,  conduct additional research if needed, and share your answers to the following questions with your classmates on the discussion board. Each question is worth 4 points totaling 16 points for Part A of the assignment.  For Part B, elaborate on another students post worth another 4 points.  The total assignment is worth 20 points.

Using only the information provided in the scenario, list the possible attributions (i.e., explanations of why this person is behaving as he/she is without knowing the real reasons behind the behavior) that coworkers and managers in the case might use to explain the persons behavior without understanding that person’s religion.
Discuss the negative and/or positive effects of these attributions on the work organization.
What should a manager do in this situation?
Explain the religious significance of this workers behavior. (NOTE: It is important to this exercise that this is the last step in the discussion.)

SCENARIOS

Mary Ellen comes to work with a dark spot on her forehead. Several times during the day, coworkers tease her about forget­ ting to wash her face and suggest that she visit the ladies room. 
David sits with his coworkers at a luncheon provided during a meeting. Chicken, with a creamy sauce, salad, and rice are served but he declines to eat and only sips water. People at the table ask him if he is feeling well. He keeps assuring them that he is fine.
Kaleen never attends any company informal or formal social events (drinks after work, trips to a nearby casino, holiday parties, etc.). In addition, in an organization where open doors are a strong cultural norm, his door is often closed for short periods of time. During his performance appraisal, his boss tells Kaleen that he needs to become more sociable and accessible if he expects to move into a management position.
Tyler works full time as an assistant manager in a large retail chain store that is open 12 hours a day, 7 days a week. It is company policy that all managers must rotate working on weekends. Tyler has been using many different excuses to avoid working on Saturdays. Although Tyler is a good worker, his boss no longer believes Tylers stories and will be noting this behavior in his next performance review.

UC Computer Science Network Security Management Discussion Responses

provide replies to below two Discussions:main que:What are three network security management best practicesAs most of the companies and organizations use internet, Information systems security. Computer and network security, it has become complex system and changes occur every day. It is important to develop a strong security strategy involves keeping one eye on the reality of Internet-speed changes in threats and technology, and the other on the reality of the corporate environment. It is necessary that the companies should know how and what to protect and what controls to put in place. This includes planning, policy development and the design of procedures. According to the January 2000 Internet Software Consortium’s Internet Domain Survey (www.isc.org/ds), there are more than 72 million hosts on the Internet. Given that many organizations do not advertise their internal name spaces, we know that many more computers are connected in some fashion to the Internet. Changes in network and security architectures, network security management is far more challenging and complex than just a few years ago (Bodhe, Masuti Umesh, 2016).Three network security management best practicesSecuring Hardening, preparing are three best practices in networkNetwork attacks are developing, and former resolutions might not be adequate to prevent future risks and attacks. This is the reason for one of the vital parts where network security best practices came into picture and having antivirus up to date in the system. Software updates should be installed, having effective anti-virus in the system will almost protect over 90 percent of instances. Installing patches is also an important aspect to be considered. System should be always secure and up-to-date. Logging should be enabled to track how is doing what, who logged into the system. Giving access on need base and eliminating privileges and access rights should be implemented as top network security standard. System administrators and network administrators should be able to identify the weaknesses.Hardening helps in solving known as well as predictable while preparing provides solution for unknown and unpredictable solutions. Always update the procedures and policies according to the trend. Implementing and exploring new tools to update configurations, policies and procedures as required.Best security management practices should me focused on four fields. They are when planning and executing the deployment on systems. Integrity maintenance. Providing awareness to the employees on security issues.Security teams support compliance mandates internally and externally, permit new facilities, improve routine, confirm obtainability, and provision the capability to troubleshoot professionally on mandate with no scope for mistake. That is a portion for steadiness when handling network security.Prevention is top network security practice.By the period to determine that the association has suffered a data breach, the damage will have already been done. Therefore, it’s so important to prepare ahead of time. After all, in terms of network security, an ounce of prevention is worth far more than a pound of cure. Computers should be configured in a way that they should be less vulnerable to any kind of malicious attacks. Integrity is an important aspect to be considered for deployments. Employees should be aware of all the security issues that’s are taking place in recent times. They should be trained to follow compliance and regulations. Disaster recovery and incident report are the best practices for a company to keep them in a place.Securing networks according to the requirements and categories of data must be handled with proper care on computers. Building servers on a tight security system and they should be dedicated for solitary purpose. Multifactor Authentication is the best practice for login system to attain a token-based authentication. Encryption should be implemented to protect certain assets. Recognize the security apprehensions associated to daily administration. Traffic monitoring should be done on an isolated network and network traffic should be captured on internal hosts.

DU Marketing Stambovsky v Ackley Purchasing a House Case Study

Read and understand the case or question assigned. Show your Analysis and Reasoning and make it clear you understand the material. Be sure to incorporate the concepts of the chapter we are studying to show your reasoning. Dedicate at least one heading to each following outline topic:Parties [Identify the plaintiff and the defendant]Facts [Summarize only those facts critical to the outcome of the case]Procedure [Who brought the appeal? What was the outcome in the lower court(s)?]Issue [Note the central question or questions on which the case turns]Explain the applicable law(s). Use the textbook here. The law should come from the same chapter as the case. Be sure to use citations from the textbook including page numbers.Holding [How did the court resolve the issue(s)? Who won?]Reasoning [Explain the logic that supported the court’s decision]Do significant research outside of the book and demonstrate that you have in an obvious way. This refers to research beyond the legal research. This involves something about the parties or other interesting related area. Show something you have discovered about the case, parties or other important element from your own research. Be sure this is obvious and adds value beyond the legal reasoning of the case.Dedicate 1 heading to each of the case question(s) immediately following the case, if there are any. Be sure to restate and fully answer the questionsQuality in terms of substance, form, grammar and context. Be entertaining! Use excellent visual materialWrap up with a Conclusion. This should summarize the key aspects of the decision and your recommendations on the court’s ruling.CASES TO CHOOSE FROM :Week 4 – Cases to Assign Week 4 Case Assignment 1 CASE 9-3 Audito v. City of Providence Case Assignment 2 CASE 9-5 The Private Movie Company, Inc. v. Pamela Lee Anderson et al. Case Assignment 3 CASE 9-6 Stambovsky v. Ackley and Ellis Realty Case Assignment 4 CASE 10-5 Arrowhead School District No. 75, Park County, Montana v. James A. Klyap, Jr. Case Assignment 5 CASE 10-5 Fitl v. Strek Case Assignment 6 CASE 13-1 Plum Creek v. Oleg Borman Case Assignment 7 CASE 13-2 Susette Kelo et al., Petitioners, v. City of New London, Connecticut, et al. Case Assignment 8 CASE 13-3 Emine Bayram v. City of Binghamton and City of Binghamton Zoning Board of Appeals Case Assignment 9 CASE 14-1 Toys “R” Us, Inc., v. Canarsie Kiddie Shop, Inc. Case Assignment 10 CASE 14-2 Victor Moseley and Kathy Moseley et al., dba Victor’s Little Secret v. V Secret Catalogue, Inc. et al.

Jawaharlal Nehru University Real-World Application of Business Intelligence Discussion

Discussion How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI.Reply 1:-Business intelligence will help in dealing with a proper leverage with respect to the software but the services on the other hand will help in bringing up a better transfer ability through the actionable intelligence. It will be given through multiple units where the influence of the organisational strategy has been completely tactic under the business stations but the intelligence which has been used in order to meet it for the and compassion pattern will be advised only on the computer technologies has been enhanced (Korth, 2018).The identification on the other hand would be discovered once the analysis of the business data has been made due to the decision making process but have the strategic operations on the other two sides would be managed only once the data warehousing as being managed by the dashboards. It could also be reported only once the technology has been associated with discovering ability but the management of data analysis on the other hand could be going through the process of the technology. Another most important part of the business intelligence would be the reference which has been associated with the Technological Applications in the aspect of crackers it has been associated with collection as integration of data by the proper analysis. It will be well presented with the finding have been reported based on the summer is but the dash quotes on mother hand could be used by the proper management of grass as well as chat as a map that has been providing the uses along with the detailed intelligence. Another most important aspect which has been associated with organisations will definitely be the competitive strategy at a market place due to increase in the process (bi-survey.com, 2019).Reply 2:-Business intelligence and Organisation prospective will help with lot of oxidation with respect to women in the decision making process of increasing operational efficiency with acid trying to get a revenue internship training. Help in identifying the market Trends based on the business problems that has been used to on the spot it out along with the address.The probability of the business transactions on the system would be migrated from the ones essentiality of the day after managed by some time based on the internal memory of the books. It was generally help in managing the software systems based on the historical context that the predictive of the business operations would be used on the data has been well gathered by the data warehouse. It can also be managed by the context that the operational efficiency of the data will be during multiple elements so that the support system would be reported only once the interactive management of the table analysis division is along with the statistical data (Koch, 2018).Will also be used in the business perspective get information which has been gathered along with the companies would be used only once the industry has been managed along with the benchmarking source. Business intelligence of original be associated with details which flower has been making it impossible to buy traditional values that sentence which has invented the Technologies will be involved with the data warehouses add remove black spots as a territory for the reporting aspect of discoveries. They are helping dealing with performance indication with the matrix which has been associated of of the organisation will help in managing the intelligence tools with countries (Koch, 2018).Note:-Its a Discussion and two replies for above questioni need everything in separate documents as 1st document should be discussion of 250words. , 2nd document should be reply 1 and 3rd document should be reply 2.make sure no turnitin and no plagiarism please dont copy it from any source write in your own words.make sure you write everything in own wordsPlease dont copy from any source we have a turnitin.And send me three documents in different folder.

Case study waterways | Accounting homework help

 
Waterways
WP19 Waterways Corporation is a private corporation formed for the purpose of providing the products and the services needed to irrigate farms, parks, commercial projects, and private lawns. It has a centrally located factory in a U.S. city that manufactures the products it markets to retail outlets across the nation. It also maintains a division that performs installation and warranty servicing in six metropolitan areas.
The mission of Waterways is to manufacture quality parts that can be used for effective irrigation projects that also conserve water. By that effort, the company hopes to satisfy its customers, perform rapid and responsible service, and serve the community and the employees who represent them in each community.
The company has been growing rapidly, so management is considering new ideas to help the company continue its growth and maintain the high quality of its products.
Waterways was founded by Will Winkman, who is the company president and chief executive officer (CEO). Working with him from the companys inception is Wills brother, Ben, whose sprinkler designs and ideas about the installation of proper systems have been a major basis of the companys success. Ben is the vice president who oversees all aspects of design and production in the company.
The factory itself is managed by Todd Senter who hires his line managers to supervise the factory employees. The factory makes all of the parts for the irrigation systems. The purchasing department is managed by Helen Hines.
The installation and training division is overseen by vice president Henry Writer, who supervises the managers of the six local installation operations. Each of these local managers hires his or her own local service people. These service employees are trained by the home office under Henry Writers direction because of the uniqueness of the companys products.
There is a small human resources department under the direction of Sally Fenton, a vice president who handles the employee paperwork, though hiring is actually performed by the separate departments. Teresa Totter is the vice president who heads the sales and marketing area; she oversees 10 well-trained salespeople.
The accounting and finance division of the company is run by Ann Headman, who is the chief financial officer (CFO) and a company vice president. She is a member of the Institute of Management Accountants and holds a certificate in management accounting. She has a small staff of accountants, including a controller and a treasurer, and a staff of accounting input operators who maintain the financial records.
A partial list of Waterways accounts and their balances for the month of November follows.
Instructions

a. Based on the information given, construct an organizational chart of Waterways Corporation.
b. A list of accounts and their values are given above. From this information, prepare a cost of goods manufactured schedule, an income statement, and a partial balance sheet for Waterways Corporation for the month of November.

Case problem 13.1 | Accounting homework help

Case problem 13.1Mary and Nick Stalcheck have an investment portfolio containing 4 vehicles. It was developed to provide them with a balance between current income and capital appreciation. Rather than acquire mutual funds shares or diversify within a given class of investment vehicle, they developed their portfolio with the idea of diversifying across various types of vehicles. The portfolio currently contains common stock, industrial bonds, mutual fund shares, and options. They acquired each of these vehicles during the past 3 years, and they plan to invest in other vehicles sometime in the future.Currently, the Stalchecks are interested in measuring the return on their investment and assessing how well they have done relative to the market. They hope that the return earned over the past calendar year in excess of what they would have earned by investing in a portfolio consisting of the S P 500 Stock Composite Index. Their research has indicated tha the risk-free rate was 7.2 % and that the (before-tax) return on the S P 500 was 10.1% during the past year. With the aid of a friend, they have been able to estimate the beta of their portfolio, which was 1.20. in their analysis, they have planned to ignore taxes, because they feel their earnings have been adequately sheltered. Because they did not make any portfolio transactions during the past year, all the Stalchecks investments have been held more than 12 months and they would have to consider only unrealized capital gains, if any. To make the necessary calculations, the Stalchecks have gathered the following information on each of the 4 vehicles in the portfolio.Common Stock. They own 400 share KJ Enterprises common stock. KJ is a diversified manufacturer of metal pipe and is known for its unbroken stream of dividends. Over the past years, it has entered new markets and, as a results, has offered moderated capital appreciation potential. Share price has risen from 417.25 at the start of the last calendar year to $ 18.75 at the end of the year, quarterly cash dividends of $0.20, $0.20, $0.25, and $0.25 were paid.Industrial bonds. The own 8 Cal Industries bonds. The bonds have $1000 par value, have a 9.250% coupon, and are due in 2018. The are A-rated by Moodys. The bond is quoted at 97.000 at the beginning of the year and ended the calendar year at 96.375%.Mutual funds,. They hold 500 shares in the Holt fund, a balanced, no-load mutual fund. The dividend distributions on the fund during the year consisted of 0.60 in investment income and $0.50 in capital gains. The fund’s NAV at the beginning of the calendar year was $19.45 and at the end of the at $20.02.Options. They own 100 options contracts on the stock of a company they follow. The value of these contracts totaled $26,000 at the beginning of the calendar year. At year-end the total value of the options contract was 429,000.Questions:a. Calculate the holding period return on a before –tax basis for each of these 4 investments vehicles.b. Assuming that the Stalchecks ordinary income is currently being tax ear a combined (federal and State) taxes rate of 38% and that they would pay a 15% capital gains tax on dividends aand capital gains for holding periods longer than 12 months, determine the after-tax HPR for each of the 4 investment vehicles.c. Recognizing that all on the Stalchecks investments were unrealized, calculate the before-tax portfolio HPR for their vehicle portfolio during the past calendar year. Evaluate this return relative to its current income and capital gain components.d. Use the HPR calculated in question c to compute Jensen;s measure (Jensen’s alpha). Use the measure to analyze the performance of the Stalchecks portfolio on a risk-adjusted, mark-adjusted basis. Comment on your finding. Is it reasonable to use Jensen’s measure to evaluate a 4-vehicle portfolio? Why or why not?e. On the basis of your analysis in a, c, d, what, if any, recommendations might you offer the Stalchecks relative to revision of their portfolio? Explain you recommendations. Please do in memo not to exceed 500 words

Genogram and interpretation | Nursing homework help

(Family History)
Genetic History/ Genogram and Interpretation (25 points)
 
Complete a family history from a client of your choosing. The following form can be found on the AMA website at http://www.ama-assn.org/ama/pub/physician-resources/medical-science/genetics-molecular-medicine/family-history.page and is available for use. Please use this form when completing the Family History Assignment. Download this copy to your computer and type in the appropriate information. Use and complete this form thoroughly. Then each student is to go to the website http://www.smartdraw.com/specials/genealogy.asp and sign up for the free access. Please be aware that the free access is time limited. Follow the directions on the website. Starting with the paternal and maternal grandparents, construct a genogram of the client’s family using the appropriate symbols and connections. Include a grid explaining the symbols that you have used. Include parental siblings and the client’s siblings. Type a brief 1 – 2 page explanation of the genogram. Provide a narrative of your interpretation of the family history to include the following:
1.            Patterns of disease.
2.            Opportunities for patient education.
3.            Factors complicating your interpretation.
4.            Risk Classification.
5.            Identify where more information is needed.
6.            This is to be written according to the APA guidelines. Use a title page. Attach the grading criteria to the back of your paper.
 
 
Genetic History, Genogram and Interpretation Rubric (25 Points)
 
 

CATEGORY

5

3

1

0

 
Score

History

Client history is complete and the correct form is used

80 to 90 % Client history is completed and non-applicable items are explained

70 to 60% of the client history is completed

50% or more of Client history is completed

 

 

5 points

3 points

2 points

0 points

 

Genogram

Genogram is in the appropriate format and all the criteria is addressed

Genogram is in the appropriate format but has only four (4) of the expected components are included

Genogram is in the appropriate format but there are less than three (3) of the expected components included

Genogram is not in the proper format and the expected components are not included

 

 

5 points

4 points

3 points

1 points

 

Discussion

All five (5) of the criteria are discussed and addressed fully with at least one reference from an acceptable source

Only four (4) of the criteria are discussed and addressed with at least one reference from an acceptable source

Only three (3) criteria are discussed and addressed with at least one reference from an acceptable source

Two (2) or less of the criteria are discussed and addressed. No references are included

 

 

5 points

4 points

3 points

1 points

 

Organization

100% of the information is very well organized with well-constructed paragraphs

80-90% of the information is organized with well-constructed paragraphs

70-60% of the information is organized with well-constructed paragraphs

Overall, 50% or more of the paper is poorly organized

 

 

4 points

3 points

2 points

0 points

 

APA

100% correct APA format.

1 APA format error.

2-3 APA format errors.

4 or more format errors.

 

 

3 points          

2 points

1 points

0 points

 

Grammar and Spelling

No grammatical, spelling or punctuation errors.

1-2 grammatical, spelling or punctuation errors.

3-4 grammatical, spelling, or punctuation errors.

5-6 grammatical, spelling, or punctuation errors.

 

 

3 points

2 points

1 points

0 points

 

Total Points  /25

 

 

 

 

 

 

Assignment instructions sociology 330 research methods assignment 3:

Assignment Instructions SOCIOLOGY 330 RESEARCH METHODS Assignment 3: Questionnaire

 
Assignment Instructions
 
SOCIOLOGY 330
RESEARCH METHODS
 
Assignment 3: Questionnaire (25 points):
Due no later than 11:55p ET on Sunday of Week 7 
Purpose: The purpose of exercise is to develop a short questionnaire containing both close-ended survey questions and open-ended questions.  Students will go through the research design process from research question, to survey construction, to analysis of survey results and theory building using a peer-reviewed article.
 
Requirements:
 

Your assignment should include 

          All sections 1-9 

 
This assignment does not have to be written in essay format.  You may organize it by section, question number with question text, and then your answer.
 
APA formatting should be used throughout.  Any time your paraphrase or directly quote a source (such as your article), in-text citations should be used.  A full APA-formatted reference should be included at the beginning or end of assignment.  
 

 
Disclaimer
Originality of attachments will be verified by Turnitin. Both you and your instructor will receive the results.
1.Research Question (1pt)
 
1)      Develop a clear, specific, sociological research question that will investigate the relationship between two social phenomena/behaviors/facts. 
 
2. Conceptual and Operational Definitions (5pts)
2)      Clearly identify the variables in your research question
3)      Identify which variable is your independent variable, and which variable is your dependent variable.
4)      Provide a conceptual definition for each variable. (i.e. similar to dictionary definition)
5)      Describe what ‘type’ of variable each variable is.
6)      Provide an operational definition for each variable.  (i.e. how the variable is going to be measured)
 
3. Hypothesis (1pt)
7)      Develop a hypothesis for your research question – a statement of what direction you believe the relationship between your two variables will be.
 
4. Questionnaire Construction (3 pts)
8)      Develop 5-10 closed-ended questions (*for groups: 10-15 questions)
a.       Some of these should measure basic socio-demographic characteristics (i.e. age, race/ethnicity, gender, SES)
b.      The rest should be indicators for your variables
c.       These should be constructed based on the ‘type’ of variable you are measuring.
9)      Develop 2-5 open-ended questions for to help measure your variables (* for groups: 3-7 questions)
a.       This is going to help provide some rich qualitative information and serve as a check for the internal validity of your close-ended questions
 
5. Sampling Design (2 pts)
10)  Describe your population, sampling frame, and method
11)   Describe your sample
 
6. Administer the Questionnaire (1 pt)
12)  Have 3-5 people complete your questionnaire. (*for groups: 10 people per person)
a.       This may be done face-to-face where you ask the questions, the respondent answers, and you record the information
b.      This may be done via a form that people fill out (i.e. it could have been sent to some friends/family via email or handed to them in the kitchen)
c.       When asking people to complete the questionnaire, you need to inform them that it is voluntary, and their identity will be kept confidential
                                                                i.      Do not put a place for name on the questionnaire
 
6. Compile the results of your questionnaire into a table (1 pt)
13)  This provides you with a simple count
14)  *For groups only: consolidate data and consult with professor by Week 6 about data analysis.
 
Sample Table

 

Indicators

Respondent 1

Respondent 1

Socio-demographic measures

 

 

 

 

Age

38

24

 

Gender

female

Male

 

Etc.

 

 

Variable 1

 

 

 

 

Measured by Q1

C – neither agree nor disagree

A – strongly agree

 

Q3

D disagree

B agree

 

Q8 (open-ended)

R1 described their daily activities in the household…

R2 described their daily activities in the household…

 

 

 

 

 

 

 

 

 

 

 

 

Variable 1

Measured by Q2

5 hours

29 hours

 

Q5

3 days a week

7 days a week

 

Etc.

 

 

 
7. Analyze the results of your questionnaire (see chapter 12) (3 pts)
15)  Provide descriptive statistics (counts) of the responses
16)  Identify trends in the data results
17)  Conduct a chi-square test (optional)
18)  How do these results help you to answer your research question
 
8. Peer-Reviewed Article (3 pts)
19)  Find 1 peer-reviewed article that is related to your research question.
20)  Briefly describe the article (thesis/research question, hypothesis, methods, findings)
21)  Compare and discuss the methods and findings of the article to your own small study
 
9. Discussion (4 pts)
22)  Briefly summarize the research purposes, methodologies, and key findings (in a non-statistical manner) of your study
23)  What are the strengths of your study and findings
24)  What are the weaknesses of your study and findings
25)  Discuss implications for future research on your research question
 
10. Reflection (1 pt)
26)  Briefly discuss what you learned about research methods through this assignment.

× How can I help you?