Ads

Pages

Thursday, December 2, 2010

STA630 Mid Term Current Paper (Dec 2010)

Question No: 1 ( Marks: 1 ) - Please choose one

Research can help in the following ways for developing methodologies, EXCEPT;

► Tools of data collection

► New technique for gathering data

► Defining a problem

► Data analysis

Question No: 2 ( Marks: 1 ) - Please choose one

Who, among the following, is the writer of Business Research Methods?

► Neuman, W.C.

► Zikmund, W.

► Sekaran, U.

► Dessler, G.

Question No: 3 ( Marks: 1 ) - Please choose one

On which of the following, Scientific knowledge mostly relies?

► Identification of events

► Logical understanding

► Prior knowledge

► All of the given options



Question No: 4 ( Marks: 1 ) - Please choose one

Research method is applicable in all of the following fields, Except.

Health care ►

Business ►

Government offices ►

Religion

Question No: 5 ( Marks: 1 ) - Please choose one

An inductive logic is one that:

Involves testing as explicitly defined hypothesis. ►

Does not allow for findings to feed back into the body of knowledge. ►

Uses quantitative methods whenever possible. ►

Allows theory to emerge out of the data.

Question No: 6 ( Marks: 1 ) - Please choose one

The part of the action research spiral that differentiates this research methodology from other kinds of research is;

Looking at multiple sources of data. ►

Taking action based on results.

Thinking about or analyzing data in more than one way. ►

The kinds of data that are collected. ►

Question No: 7 ( Marks: 1 ) - Please choose one

What is the problem with using strict definitions of important concepts?

They take the focus away from accurate measurement.

They prevent the researcher from assessing alternative ways of viewing a concept.

They prevent a consistent approach being achieved with business research.

They prevent research from being truly objective.

Question No: 8 ( Marks: 1 ) - Please choose one

Which one of the following creates problems of measurements of a concept?

► Vague meanings

► Dictionary meanings

► Clear meanings

► Unambiguous meanings

Question No: 9 ( Marks: 1 ) - Please choose one

Which of the following statements is false about variables?

► Discrete variables allow measurement of an infinite number of fractions of units of measurement.

► Discrete variables can only have whole number values.

► Continuous numbers can only have whole number values.

► Continuous measures do not allow for scores that fall between two number values.

Question No: 10 ( Marks: 1 ) - Please choose one

Which of the following refers to"A condition or characteristic that can take on different values or categories"?

► A constant

► A variable

► A cause and effect relationship

► A descriptive relationship

Question No: 11 ( Marks: 1 ) - Please choose one

Which of the following statements best defines hypothesis?

► A quantitative study.

► A tentative prediction of the results of the research.

► A qualitative research design.

► The operational definition of the study.

Question No: 12 ( Marks: 1 ) - Please choose one

Which of the following is the meaning of the term "To read critically"?

Skimming through the material because most of it is just padding.

Evaluating what you read in terms of your own research questions.

Being willing to criticize what you read.

Taking an opposing point of view to the ideas and opinions expressed.

Question No: 13 ( Marks: 1 ) - Please choose one

What is the first step in the research process?

► Problem definition

► Define broad problem area

► Theoretical framework

► Preliminary data collection

Question No: 14 ( Marks: 1 ) - Please choose one

When there is a need of generating new ideas for hypotheses or to interpret the results of some research, which one is the best research deign?

Experiment

► Surveys

► Focus group discussion

► Communication analysis

Question No: 15 ( Marks: 1 ) - Please choose one

When the research starts from the effects and tracing the reasons back in time, what does it called?

Case study

► Experiment

► Observation studies

► Historical comparitive research

Question No: 16 ( Marks: 1 ) - Please choose one

All of the following are unethical issues, EXCEPT;

► Invoicing irregularities

► Avoiding legal liability

► Misrepresenting results

► Seeking permission for entry

Question No: 17 ( Marks: 1 ) - Please choose one

Which of the following Statements is TRUE for cross-sectional research design?

Allows for data in connection with two or more variables to be collected.

Is typically strong in internal validity.

Is commonly used for collection of qualitative data.

Allows for data collection over a substantial period of time.

Question No: 18 ( Marks: 1 ) - Please choose one

Which of the following is a legitimate purpose of a research plan?

► It forces you to think through every aspect of a study.

► It provides detailed procedures to guide the conduct of the study.

► It provides clear roadmap of the study.

► Writing a plan facilitates the evaluation of it.

All top three options support the question but I have to allowed to select one .

Please consider question.

Question No: 19 ( Marks: 1 ) - Please choose one

Which of the following is NOT a drawback to free response items?

► Results from free response items take longer to analyze.

► Many participants tend not to answer free response items.

► Free response items allow participants to add information that was not directly requested.

► Many participants tend to be less truthful in free response items.

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following is NOT a source of literature review?

► Scholarly Books

► Dissertations

► Policy Reports and Presented Papers

► Story book

Question No: 21 ( Marks: 1 ) - Please choose one

Which of the following is most beneficial to read in an article?

► Methods

► Introduction

► Figures

► References

Question No: 22 ( Marks: 1 ) - Please choose one

Which of the following statement is true about the peer review?

► Name of the article's author is not mentioned to avoid biases

► It should be accepted

► It should be published in a well known journal

► Name of the author should be mentioned for the further correspondence

Question No: 23 ( Marks: 1 ) - Please choose one

Which of the following is a nondirectional hypothesis?

► Teachers receiving holistic stress-reduction training will be less stressed than teachers who do not receive such training.

► Teachers receiving holistic stress reduction training will have similar levels of stress as teachers who do not receive such training.

► Teachers receiving holistic stress reduction training will have significantly lower stress levels than teachers who are not receiving such training.

Teachers receiving holistic stress reduction training and levels of stress that the teacher has is related to one another

Question No: 24 ( Marks: 1 ) - Please choose one

Managers of the client organization of the researcher are more likely to read:

► Recommendations of the report

► Objectives of the report

► The extensive literature review

► Complete report

Question No: 25 ( Marks: 1 ) - Please choose one

Which of the following is not a party in the research?

► Sponsors

► Respondents

► Researchers

► Society as a whole

Question No: 26 ( Marks: 1 ) - Please choose one

Behavioral measures of the variables are called:

► Dimensions

► Elements

► Items

► Questions

Question No: 27 ( Marks: 1 ) - Please choose one

Which of the following refers to operationalization?

► Concept à Dimension à Elementsà Items

► Dimensionsà Elements à Itemsà Questions

► Questionsà Itemsà DimensionsàElements

► Variableà Conceptà DimensionsàElements

question is not read able

Question No: 28 ( Marks: 1 ) - Please choose one

Which of the following is an indicator of the job stress?

► Competitive pay

► Role conflict

► Fair policies

► None of the given options

Question No: 29 ( Marks: 1 ) - Please choose one

Consumer price index (CPI) is a (an) __________scale

► Interval

► Nominal

► Ordinal

► Ratio

Question No: 30 ( Marks: 1 ) - Please choose one

Which type of measurement scale describes the typical test scores that range from 0 to 100?

► Nominal

► Ordinal

► Interval

► Ratio

Question No: 31 ( Marks: 1 ) - Please choose one

Which of the following functions is performed by the Odinal scale?

► Categorize

► Distance

► Order

► Unique origin

Question No: 32 ( Marks: 1 ) - Please choose one

Refusal rate of the personal interview is high in:

► Office meeting with an appointment

► Shopping malls

► Homes

► None of the given options

Question No: 33 ( Marks: 1 ) - Please choose one

Following can bias the data except:

► Unstandardized wording

► Interviewee influence

► Interviewer influence

► Deliberate probing

Question No: 34 ( Marks: 1 ) - Please choose one

Which of the following is the type of telephone interviewing in which the interviewer reads questions from a computer screen and enters the respondent's answers directly into the computer?

► CATI

► CAPI

► SPSS

► STATA

Question No: 35 ( Marks: 3 )

Reliability and validity of experimental research is highly important, how can these aspects of research be implemented?

Researcher must eliminate alternative explanations which can make the hypothetical relationship fake . They can do this by choosing a research design that physically controls potential alternative explanations for results

Question No: 36 ( Marks: 5 )

What is the difference between confidentiality and anonymity?

Confidentilaity

is the state of being secret, It mean you information shared are you carrying is not making public. It will be kept away from the general publics information.

Suppose if a doctor is treating an AID patient. He should not share is medical reports to others. He/she kept those information scacret.

Anonymity

is that one is not identifiable to persons other than those one communicates with. His name or identification is not discoed to anyone else.

Like if doctor is sharing information with someone but he will not disclose the name of his/her patient. He can share his medical report but same time keeping his name anonymous.

Question No: 37 ( Marks: 5 )

What kind of problems can be faced by the researcher while checking reliability with test-retest method? How a researcher can overcome it?

There are two kinds of problems with measures of test-retest reliability which is common to all longitudinal studies.

The first measure may sensitize the respondents to their participation in a research Project.

Influence the results of the second measure.

Further if the time between the measures is long it may leads to attitude change.

Thus it is possible for a reliable measure to indicate or medium correlation between the first and the second. This low correlation may be due to an attitude change over time rather than to lack of

Reliability

Saturday, November 27, 2010

CS 604 assignment no 2 solution









mth202 assignment no 3

Question no 1) Show that f(x) is one to one; where







Question 2) Find the inverse function of







Q3) Find the common fraction for the recurring decimal 0.7


Wednesday, November 24, 2010

CS-504 Assignment#2 Solution

Q1:Differentiate the following

1) Coupling and Cohesion

2) Object-Oriented and Function-Oriented design

Your solution should be in following format:

Coupling

Cohesion

Coupling between modules/components is their degree of joint interdependence; lower coupling is healthier.

Cohesion of a solitary module/component is the degree to which its responsibilities form a significant unit; higher cohesion is healthier.

v Size: number of relations between routines

v intimacy: the directness of the link among routines

Someone had indistinct reference to decomposability here. Amplification?

v visibility: the prominence of the connection between routines

v flexibility: the ease of changing the connections between routines

How concerning: 'Cohesion is inversely relative to the number of responsibilities a module/part has.'

Coupling explains how dependent a given part of software is on other modules. An extremely coupled system in one in which the events in one module can directly right to use rudiments of another module. A low coupled system in one in which the events of one module can only interrelate with the procedures of another during an interface channel. Highly coupled systems are often characterized by code that is hard to read & maintain (the cause cohesion and coupling are frequently used as opposites).

Cohesion explains how "paying attention" a part of software is. A highly-cohesive system is one in which all procedures in a specified module work jointly towards some end aim. High cohesion is frequently typified by high readability and maintainability.

Object-Oriented Design

Function-Oriented Design

The Basic concept is not the services accessible to the clients of the system

The basic concept is available to clients of the system

The state information survive in the form of data distributed between several objects of the system

The state information is accessible in a federal shared data store.

Group function jointly on the basis of data they work on

Group Functions together if as a group, they constitute a higher level Function

Where OOP orients on objects,

Or as called in C++ classes.

Functional oriented plan familiarize on functions

Object is data with techniques of processing it.

Functions, obtain some data, process it and then revisit result, or do several actions.

Q2

1) Write down any custom built C++ Class which you think is not cohesive (or low cohesive).

Public I Enumerable GetEmployeesFromDb_LowCohesion()

{
// instantiate the links
using(SqlConnection connection = newSqlConnection(ConfigurationManager.ConnectionStrings[CONNECTION_STRING_KEY].ConnectionString))
using(SqlCommand command = new SqlCommand("spGetEmployee", connection)) // instantiate the command

{
command.CommandType = CommandType.StoredProcedure;

// try to open the links
try
{
connection.Open();
}
catch (InvalidOperationException ex)
{
// log exemption
throw;
}
catch (SqlException ex)
{
// log exemption
throw;
}
catch (Exception ex)
{
// log exception
throw;
}

// perform the reader & read the results
using(SqlDataReader reader = command.ExecuteReader())
{
Int32 m_NameOrdinal, m_DeptOrdinal;

// obtain the ordinals
try
{
m_NameOrdinal = reader.GetOrdinal(NAME);
m_DeptOrdinal = reader.GetOrdinal(DEPARTMENT);
}
catch(System.IndexOutOfRangeException ex)
{
// log exemption
throw;
}

Collection result = new Collection();

// interpret the results
while(reader.Read())
{
try
{
Employee emp = new Employee();
emp.Name = reader.IsDBNull(m_NameOrdinal) ? String.Empty: reader.GetString (m_NameOrdinal);
emp.Department = reader.IsDBNull (m_NameOrdinal) ? String.Empty : reader.GetString(m_DeptOrdinal);
result.Add(emp);
}
catch (IndexOutOfRangeException ex)
{
// Log the exemption
throw; // rethrow or handle gracefully here
}
catch (Exception ex)
{
// Log the universal exemption
throw; // rethrow or handle gracefully here
}
}

return result;
}
}
}

CS 615 2nd Idea Solution

Solution:

Question # 1:

01 How Facilitated Application Specification Techniques (FAST) help in the requirement elicitation for software? Is requirement analysis and requirements elicitation is same thing?

Solution:

Effective software management plan much depends on the nature of the software itself, to be developed. The plan can only remain successful if all the scheduled activities are performed according to the timelines already decided. It has been observed that quite a high amount of projects both in developing and developed countries fail despite the organization wide process maturity. There are many factors that contribute in the successful and on time completion of the software but the most important of the phases is the requirement engineering in which requirement are to be fabricated and rectified again and again to suggest the most appropriate requirements. FAST (Facilitated Application Specification Technique) has emerged as a technology to help decrease the communication gap between the customer and the developer. The success of FAST session generally depends on the way the session is conducted by the facilitator

Requirement analysis

Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product. These features, called requirements, must be quantifiable, relevant and detailed. In software engineering, such requirements are often called functional specifications. Requirements analysis is an important aspect of project management.

Requirements analysis involves frequent communication with system users to determine specific feature expectations, resolution of conflict or ambiguity in requirements as demanded by the various users or groups of users, avoidance of feature creep and documentation of all aspects of the project development process from start to finish.

Energy should be directed towards ensuring that the final system or product conforms to client needs rather than attempting to mold user expectations to fit the requirements.

Requirements analysis is a team effort that demands a combination of hardware, software and human factors engineering expertise as well as skills in dealing with people.

Requirements Elicitation

a) Standish Group listed "Lack of User Input" as most common factor of challenged projects.

b) Requirements Elicitation is the process of discovering the requirements for a system by communication with customers, system users and others who have a stake in the system development.1

c) Development teams have to take the initiative.

Requirements elicitation is concerned with where software requirements come from and how the software engineer can collect them. It is the first stage in building an understanding of the problem the software is required to solve. It is fundamentally a human activity, and is where the stakeholders are identified and relationships established between the development team and the customer. It is variously termed "requirements capture," "requirements discovery," and "requirements acquisition."

One of the fundamental tenets of good software engineering is that there is good communication between software users and software engineers. Before development begins, requirements specialists may form the conduit for this communication. They must mediate between the domain of the software users (and other stakeholders) and the technical world of the software engineer.

Question # 2:

Make comparative analysis between the GOF design pattern and GRASP design pattern with their pros and cons.

Solution:

GRASP stands for General Responsibility Assignment Software Patterns

There are several GRASP patterns. Some of them are simply good design principles, and one can argue whether they are really patterns. For example, High Cohesion and Low Coupling are two that are well known design principles and not really patterns.

The full set of GRASP patterns are:

1. Information Expert

2. Creator

3. Controller

4. Low Coupling

5. High Cohesion

6. Polymorphism

7. Pure Fabrication

8. Indirection

9. Protected Variations

I. This approach to understanding and using design principles is based on patterns of assigning responsibilities.

II. The GRASP patterns are a learning aid to help one understand essential object design, and apply design reasoning in a methodical, rational, explainable way.

III. After identifying your requirements and creating a domain model, then add methods to the software classes, and define the messaging between the objects to fulfill the requirements.

Doing:

a) Doing something itself, such as creating an object or doing a calculation

b) Initiating action in other objects

c) Controlling and coordinating activities in other objects.

Knowing:

a) Knowing about private encapsulated data

b) Knowing about related objects

c) Knowing about things it can derive or calculate

a) Interaction diagrams show choices in assigning responsibilities to objects.

b) GRASP patterns guide choices in where to assign responsibilities.

c) GRASP patterns are a codification of widely used basic principles.

d) Assign a responsibility to the information expert – the class that has the information necessary to fulfill the responsibility.

e) What is a general principle of assigning responsibilities to objects?

f) Who should be responsible for knowing/doing …?

g) Domain model (domain expert, domain analysis) to design model (software classes).

h) Any existing to any representative.

GOF design pattern

A pattern addresses a recurring design problem that arises in specific design situations and presents a solution to it.

There are many types of GOF design pattern we will discuss some of them

I. Creational Design Patterns

II. Singleton Design Pattern

III. Visitor Design Pattern

IV. Strategy Pattern

V. Command Pattern

VI. Proxy Design Pattern

Singleton Design Pattern: The Singleton pattern ensures that a class has only one instance. Provides a global point of access to that instance.

Constructor is 'PRIVATE'. This ensures that no other code in your application will be able to create an instance of this class, by using the constructor directly. Using a static method, which returns an object? Static variable, used for holding the created instance. If the instance is already there, the static method do not create a second one, instead returns the already created one. When multiple threads are introduced, you must protect the getInstance() method through synchronization. If the getInstance() method is not protected against synchronization, it is possible to return two different instances of the Singleton object. Refer to Double Checked Lock (DCL) programming pattern and Thread Local implementation for better singleton implementation in a multithreaded environment.

The Proxy Design Pattern the Proxy pattern is used when you need to represent an object that is complex or time consuming to create, by a simpler one. If creating an object is expensive in time or computer resources, Proxy allows you to postpone this creation until you need the actual object. A Proxy usually has the same methods as the object it represents, and once the object is loaded, it passes on the method calls from the Proxy to the actual object. There are several cases where a Proxy can be useful:

a) If an object, such as a large image, takes a long time to load.

b) If the object is on a remote machine and loading it over the network may be slow, especially during peak network load periods.

c) If the object has limited access rights, the proxy can validate the access permissions for that user.

The Visitor Design Pattern: The Visitor pattern turns the tables on our object-oriented model and creates an external class to act on data in other classes. This is useful when you have a polymorphic operation that cannot reside in the class hierarchy for some reason.. For example, the operation wasn't considered when the hierarchy was designed, or because it would clutter the interface of the classes unnecessarily.

The Strategy Pattern: The Strategy pattern is much like the State pattern in outline, but a little different in intent. The Strategy pattern consists of a number of related algorithms encapsulated in a driver class called the Context. Your client program can select one of these differing algorithms or in some cases the Context might select the best one for you. The intent is to make these algorithms interchangeable and provide a way to choose the most appropriate one. The difference between State and Strategy is that the user generally chooses which of several strategies to apply and that only one strategy at a time is likely to be instantiated and active within the Context class.

By contrast, as we have seen, it is possible that all of the different States will be active at once and switching may occur frequently between them. In addition, Strategy encapsulates several algorithms that do more or less the same thing, while State encapsulates related classes that each do something somewhat different. Finally, the concept of transition between different states is completely missing in the Strategy pattern.

The Command Pattern: The Chain of Responsibility forwards requests along a chain of classes, but the Command pattern forwards a request only to a specific object. It encloses a request for a specific action inside an object and gives it a known public interface. It lets you give the client the ability to make requests without knowing anything about the actual action that will be performed, and allows you to change that action without affecting the client program in any way