.......................83 3.4. Research design .........................................................................................................................88 3.4.1. The selection of the case study sites......................................................................................88 3.4.2. The sub-units of analysis........................................................................................................90 3.4.3. Data sources..................................
Premium Scientific method Research Case study
Use case name: Request for Plotter sheet ID: 1 Importance level: High Primary actor: Student Short description: Events to happen when requesting for a plotter sheet. Trigger: Filled in Plotter Sheet Type: External Major Inputs Major Outputs Description Source Description Destination Subject Student EDP Code Student Filled in Plotter sheet Student Time Student Days Student Room No. Student Major Steps Performed Information for Steps
Premium Subject Student Use case
Procedures in Collecting Forensic Evidence Organizational fraud and abuse account for five percent of a company’s gross revenues. The effect of occupational fraud and abuse on a company is an increase in costs‚ a reduction in potential raises‚ and a reduction in profits. Occupational fraud is categorized as asset misappropriations‚ fraudulent statements‚ and corruption. Corruption includes change from positive morals and principles to bad. The potential corruption schemes a company should
Premium Political corruption Fraud Creative accounting
Identify Controls 18 points (2 points each) What control or controls would you recommend in a computer processing system to prevent the following situations? A. Working through the main control console‚ the night shift computer operator made a change in a payroll program to alter his rate of pay in his favor. -operator should not have access to program documentation (source code) -use password -console log should be reviewed for unauthorized activity B. A customer payment recorded
Premium Accounts receivable Source code Money
Identify the different substances which individuals might use‚ how they are used and their likely effects. Abused substances produce some form of intoxication that alters judgment‚ attention‚ perception‚ or physical control. Psychoactive drugs can be categorised into three broad groups: 1 Stimulants: Amphetamines‚ Cocaine‚ Crack‚ Ecstasy‚ Anabolic steroids 2 Depressants: Cannabis‚ Alcohol‚ Benzodiazepines GHB etc. 3 Hallucinogens: LSD‚ Magic Mushrooms (Psilocybin)‚ Skunk. Drugs also have street
Free Drug addiction Recreational drug use Psychoactive drug
study: MBA Course Title: Marketing Research Course code: MBA 763 Assignment: Secondary Data Mat Number: 74168 Name: Abiona Timothy Olufemi What is Data Data is a collection of facts‚ such as numbers‚ words‚ measurements‚ observations or even just descriptions of things. 1.Information in raw or unorganized form (such as alphabets‚ numbers‚ or symbols) that refer to‚ or represent‚ conditions‚ ideas‚ or objects. Data is limitless and present everywhere in the universe. See also information and knowledge
Premium Research
IDENTIFYING CORE COMPETENCIES FOR ELECTRONIC RESOURCES LIBRARIANS IN THE TWENTY-FIRST CENTURY LIBRARY A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE GRADUATE SCHOOL OF THE TEXAS WOMAN‘S UNIVERSITY COLLEGE OF PROFESSIONAL EDUCATION BY SARAH W. SUTTON‚ M.L.S. DENTON‚ TEXAS MAY 2011 TEXAS WOMAN‘S UNIVERSITY DENTON‚ TEXAS December 3‚ 2010 To the Dean of the Graduate School: I am submitting herewith a dissertation written
Premium Library science Library Librarian
Data Collection: Data collection is the heart of any research. No study is complete without the data collection. This research also includes data collection and was done differently for different type of data. TYPES OF DATA Primary Data: For the purpose of collecting maximum primary data‚ a structured questionnaire was used wherein questions pertaining to the satisfaction level of the customer about pantaloons product(apparel)‚ the quality‚ color‚ variety of products‚ the availability of different
Free Scientific method Marketing Exploratory research
industries. AS is made up of two (2) different divisions‚ the Commercial Division and the Defense Division. The Commercial Division is located in Chula Vista‚ CA and the Defense Division is located in Santa Ana‚ CA. AS company strategy is to offer low cost design and computer aided modeling packages to companies and assists them through the lifecycle of their product in an effort to save money for the consumer while profiting from their business. Two Security Vulnerabilities Hardware vulnerabilities
Premium Computer security Active Directory Windows Server 2008
research data on how people use electricity in their homes during the course of the day. But for the past two years‚ one U.S. university has attacked the problem directly. Students and faculty conducting energy and smart grid research at the University of Texas have had access to a treasure trove of knowledge found nowhere else on earth: billions of time-stamped data records from the Pecan Street Research Institute’s original field research that measure minute-to-minute consumer energy use down the
Premium Electric car University Solar cell