Free Essay

Coding Questions

In:

Submitted By prashilbonaparte
Words 1471
Pages 6
Addition Simplification
Problem Statement

Bart Simpson is a student in the nursery school and is just learning how to add. The sum of multiple numbers needs to be calculated and the numbers can be either 1, 2 or 3 to make the calculation easier. Bart Simpson however, can calculate the sum only if the numbers to be added are in a non-decreasing order. For example Bart can calculate 1+1+2+2+3+3 but not 2+1+2+3+1+3. You have to help Bart to rearrange the numbers such that it is easy for him to calculate them.

Input Format

First line contains an integer 't' denoting total test cases.

Next 't' lines contain non-empty string s - the sum Bart needs to calculate. String doesn’t contain spaces and contains only digits and the '+' character.

Length of string s <=100. t<=100. Output Format

For each test case, the new order displayed in the format such that Bart can count followed by a new line.

Sample Input

4
1
2+2
3+2+1
2+2+1+1+3
Sample Output

1
2+2
1+2+3
1+1+2+2+3

Explanation

For the above cases, output is displayed in the format such that Bart can calculate it.

Play Auditions
Problem Statement

There are a total of ‘a’ men and ‘b’ women who would be coming to a play audition. In order to select participants for the play we need to follow the given constraints. While choosing the group, there should be exactly ‘x’ people in total and should contain more than 3 men and at least 1 woman. You are required to find total number of ways in which the group can be formed. The groups are considered distinct only if the composition of participants differ.

Input Format

A single line contains three space separated integers a, b, x.

Constraints:

4 ≤ a ≤ 30 1 ≤ b ≤ 30
5 ≤ x ≤ a + b

Output Format

Ouput the integer denoting the required possible number of ways.

Sample Input

5 2 5

Sample Output

10

Crypto-Codes
Problem Statement

Alice maintains a set consisting of ‘a’ numbers which he finds to be very lucky. He is developing a secure system for which he needs to generate a crypto-code. Now, he has some constraints while generating the crypto-code. Let S be a set of all possible numbers generated by the concatenations of ‘b’ positive numbers chosen from Alice’s set of lucky numbers. The crypto-code C is the largest number from the resultant set S such that the value of C modulo 9 should be zero.

Help Alice find out the Crypto-Code C.

Input Format

First line contains an integer T- denoting the total number of test cases.
For each test case, the following lines follow:
One line contains two integers ‘a’ and ‘b’.
Following ‘a’ lines contain the ‘a’ lucky numbers.

Constraints

T<=30
1 <= b <= a <= 100
1 <= all lucky numbers <= 1000000

Output Format

Output a single integer denoting the answer to the corresponding test case. If an answer is not possible, print -1.

Sample Input

2
3 2
1
2
3
5 2
1
2
3
4
5

Sample Output

-1
54

Explanation

For the first case, there in no number in the set S whose value mod 9 is 0. For the second case, 54 formed by the concatenation of 5 and 4 is the largest number satisfying the given conditions.

Game of Blocks
Problem Statement

Tyrion Lannister is trapped in a rectangular room when he is imprisoned by Lysa Arryn. This room consists of blocks coloured either yellow or red. Tyrion Lannister is standing on a red block. He can move to one of the four adjacent blocks from the block on which he is standing. But he cannot move on yellow blocks and can only move on the red blocks.

Write a program which will count the number of red blocks which Tyrion can reach by repeating the moves described above.

Input Format

First line consists of two positive integers A and B; A and B are the numbers of blocks in the x- and y- directions respectively. (2 <= A,B <=20)

The next B lines each contains A chars. Each character represents the colour of a block as follows:

'.' - a red block
'#' - a yellow block
'@' - Tyrion on a red block (appears exactly once)
The end of the input is indicated by a line consisting of two space separated zeroes.
Total cases in one test file <=200.

Output Format

Output the total number of red blocks Tyrion can reach from the start block (including start block).

Sample Input

2 3
..
.@
.#
7 7
..#.#..
..#.#..
###.###
...@...
###.###
..#.#..
..#.#..
0 0

Sample Output

5
13

Explanation

In the first case, Tyrion can first go up, then left, then below and then further below so as to reach 5 red blocks including the one on which he is currently standing.

Number Game
Problem Statement

You are given two numbers ‘a’ and ‘b’. Your task is to make the two numbers equal by performing the minimum number of operations. In one operation, you can pick any one of the number and divide it by 2 if it is divisible by 2 or you can divide it by 3 if it is divisible by 3 or you can divide it by 5 if it is divisible by 5.

Input Format

The first line contains the total number of test cases 't'.
Next 't' lines contain 2 space separated integers 'a' and 'b'.

Constraints

1 <= a,b <= 1000000000 t<=100 Output Format

Output a single integer on a new line denoting the minimum number of operations for each test case. If it is not possible to make the numbers equal, print -1.

Sample Input

3
7 8
13 13
20 15

Sample Output

-1
0
3

Explanation

For the first case, the numbers cannot be made equal, hence -1. For the second case, they are already equal hence 0. For the third case, 20 can be divided by 2 two times and 15 divided by 3 for 1 time thus taking a minimum of 3 operations.

Character Pairs
Problem Statement

There is a string M of length L. You have to find the total number of pairs satisfying the conditions:
0 <= a,b < L and M[a]=M[b] where 'a' and 'b' are integers.

Input Format

First line contains total test cases denoted by integer 't'.
Next t lines contain the string M.

Constraints

t<=10.
1<=L<=100000.
String can contain lower-case letters and numeric characters.

Output Format

On a new line, a single integer denoting the answer to the test case.

NOTE
Pairs (p,q) and (q,p) are considered distinct.

Sample Input

2 djsce20 hh

Sample Output

7
4

Explanation

For the second case, Note that 'a' can be equal to 'b' thus giving 4 distinct pairs.

Poor Dishes
Problem Statement

In a restaurant, we have 'x' dishes numbered from 1 to x. Each dish can either be attributed as a poor tasting dish or a pleasant tasting dish. You definitely want to stay clear of the poor tasting dish. You find various reviews online that tell you the number of poor dishes within an inclusive range of dishes. You find 'y' such reviews. You need to find out the minimum number of ‘poor dishes’ and the maximum number of 'poor dishes' present in the menu depending upon the 'y' reviews that you obtain. We are finding out the minimum and maximum numbers of poor dishes as we cannot exactly determine the number of poor dishes.

Input Format

First line conatins 2 spaced integers 'x' and 'y'.
The next 'y' lines contains 3 spaced integers 'p' 'q' 'r' indicating that there are exactly 'r' poor dishes in the range of [p, q] dishes.

Constraints

0 <= x,y <= 101
1 <= p <= q <= x
0 <= r <= q-p
The given information will be sufficient to find the minimum and maximum poor dishes.

Output Format

Print 2 space separated integers denoting the minimum no. of poor dishes and the maximum number of poor dishes in the entire menu respectively.

Sample Input

3 2
1 2 1
2 3 1

Sample Output

1 2

Explanation

The initial line is "3 2", i.e. that there are 3 dishes and we have 2 sets of reviews. The next line says there is one poor dish in the set of dishes {1, 2}. The final line says there is one poor dish in the set {2,3}. There are two possibilities for this scenario: Dishes number 1 and 3 are poor or dishe number 2 is poor.

Similar Documents

Premium Essay

Variables Coding and Questions Coding List for Spss

...Variables coding and Questions coding list for SPSS Serial | Questions | | Options coding | Demographics | 1 | Gender | | [ 1 ] Male | [ 2 ] Female | 2 | Age | | [ 1 ] 20-30 | [ 2 ] 31-40 | [ 3 ] 41-50 | [ 4 ] 50 and above | 3 | Qualification | | [ 1 ] PhD | [ 2 ] MS/ MPhil | 4 | Tenure | | [ 1 ] Less than 1 year | [ 2 ] 1 – 2 years | [ 3 ] 2 – 5 years | [ 4 ] 5 – 10Years | [ 5 ] 10 years & above | 5 | Sector | | [ 1 ] Public | [ 2 ] Private | [ 3 ] Semi Government | 6 | Employment Status | | [ 1 ] Permanent | [ 2 ] Contractual | Branding Questions | Variable coding | Statements | | Word-of-mouth | | WM 1 | I often tell others about the Brand X | | WM2 | I recommend Brand X to others | | WM3 | I will leave positive comments about Brand X on community sites | | Brand Personality | | Sincerity | | BPSI 1 | BP1 | Brand X is honest | | BPSI 2 | BP2 | Brand X is sincere | | BPSI 3 | BP3 | Brand X is real | | Brand Personality | | Excitement | | BPEX 1 | BP4 | Brand X is exciting | | BPEX 2 | BP5 | Brand X is young | | BPEX 3 | BP6 | Brand X is up-to-date | | Brand Personality | | | Sophistication | | | BPSO 1 | BP7 | Brand X is upper-class | | BPSO 2 | BP8 | Brand X is good looking | | BPSO 3 | BP9 | Brand X is charming | | Brand Personality | | Ruggedness | | BPRD1 | BP10 | Brand X is masculine | | BPRD2 | BP11 | Brand X is rugged | ...

Words: 436 - Pages: 2

Free Essay

20th Foot Musters

...Thomas WILLIAMS – service record extracted from Muster Rolls of 20th Foot regiment 1812 May Active in Newry “Volunteer from Royal Westminster Militia paid by them to 6th May” (as a private) June Active in Newry July “From Private” (to Drummer on 25th). “Sent recruiting To Bungay, Suffolk, Eng paid by me to 25th” August Recruiting in Bungay September Recruiting in Bungay October In red: “Cordwainer at St George, Middlesex” November Recruiting in Bungay December “To recruiting company” 1813 January Recruiting in Bungay February Recruiting in Bungay March Recruiting in Bungay April Recruiting in Bungay May Recruiting in Bungay June Recruiting in Bungay July Recruiting in Bungay August Recruiting in Bungay September Recruiting in Bungay October Recruiting in Stowmarket November Recruiting in Stowmarket December Recruiting in Stowmarket 1814 January Recruiting in Stowmarket (Regiment shown as being in Totnes) February Recruiting in Stowmarket March Recruiting in Stowmarket April Recruiting in Stowmarket May Recruiting in Stowmarket June Recruiting in Stowmarket July Recruiting in Stowmarket “The regiment being at home this manning will be discontinued on the rolls from 25th July” (home depot = Knightsbridge) August Recruiting in Stowmarket (Regiment shown as ‘on ship’) September Recruiting in Stowmarket October Recruiting...

Words: 829 - Pages: 4

Premium Essay

Nt1330 Unit 3.1 Problem Analysis

...PROBLEM FORMULATION 3.1 Problem Statement Low density parity check codes are forward error correcting codes. The LDPC block codes are inefficient, since a new code must be hypothesized each time a change in frame size is desired. A number of algorithms with varying complexity and performance have been proposed for LDPC decoding. But achieving a balanced trade-off between decoding performance and implementation complexity still remains a potential problem. LDPC decoding algorithms operates by making either hard decision or soft decision on the message received from the noisy channel [20]. 3.1.1 Sum product Algorithm The sum product algorithm for LDPC decoding is a soft decision message passing algorithm. In case of soft decision based algorithms, the input data to the decoder is the channel probabilities, represented in logarithmic ratio which is known as log-likelihood ratio (LLR). This algorithm requires LLR for variable node operations to make decoding decisions. The LLRs are transferred over to the variable nodes (V), this variable node carry out the sum operation on the input LLRs as in equation (1) and computed messages are passed along the connected edges to the check nodes (C). SPA Variable node operation: V_i=〖LLR〗_n+∑_(j≠i)▒C_j (1) Where n=1,2,. . . .number of variable nodes i, j=1,2,. . . .degree of variable node The operation performed by the check nodes (C) is given in equation (2). The check nodes also perform...

Words: 910 - Pages: 4

Premium Essay

Axial Coding Paper

...Other than the methods discussed above, there are few other methods can be applied under the grounded theory such as open coding, axial coding, selective coding, memoing, sorting, writing and many others.For our research purpose as stated by Holy Feen we will be only looking at the first three methods. The first method is known as open coding. Open coding is carried out by analysing a research by identifying, naming, categorizing and describing a phenomena found in the text. The only way for us to analyse a research is by going through each line and paragraph and also reading and re-reading in search of the answer by questioning ourselves 'what is the objective about?' or 'what is being referenced in that particular line?'. These categories may consist...

Words: 465 - Pages: 2

Free Essay

Linear Block Codes

...________________________________________________________________ LINEAR BLOCK CODES A systematic (n,k) linear block code is a mapping from a k-dimensional message vector to an ndimensional codeword in such a way that part of the sequence generated coincides with the k message digits. The difference (n − k) represents the parity bits. A systematic linear block will have a [k × n] generator matrix [G] of the form G=[P IK ] Then the code is given as C= D*G Where D is the data word. Another important matrix associated with block codes is the [(n − k) × n] parity check matrix, [H]. The parity check matrix is formed by starting with the identity matrix and appending the transpose of the nonidentity portion of [G]: H=[IK PT ] The parity check matrix has the property c[H]T = 0 That is, any errorless, received code word multiplied by the transpose of the parity check matrix, [H], yields a zero vector, or syndrome. If the received code word contains an error, the resulting vector will match the corresponding bit that caused the error. S= R[H]T=E H]T Where S= error syndrome R= received codeword E=error Algorithm: 1. Take generator matrix from the user. 2. Create the 4 bit data word, total of 16 data words, using two dimensional array in the matlab. 3. Then code word is generated utilizing the matrix multiplication formula for the code word. 4. Then Hamming distance...

Words: 841 - Pages: 4

Free Essay

Coding Theory

...Coding Theory 8/12/15 Coding theory is a study of codes it is generally used in error correcting codes ad error detecting codes. It is way to have a secured application or network in today’s generation where the technology and information is growing rapidly. How coding theory works is for example we have lots of information and we want to decode it. Error detecting will detect all the errors in the information and error correcting will fix al the errors but most of the time it can we difficult to correct the errors when they are detected. Coding theory has many techniques different like hamming codes, perfect codes and generator matrices these are few techniques that work with coding theory. Error detecting codes helps look for errors in information or codes and it lists all the errors in the codes. Since most of the technology we use are binary numbers of 0’s and 1’s error detecting codes uses these binary numbers to look for the errors in codes. Some of the things like digital messages and zip code use error detecting to find any error like if there is a wrong zip code entered. Error correcting codes include error detecting codes so it can detect errors and also fix the errors. What exactly error correcting does is for example if we send some data to someone. Error correcting will fix all the errors it has detected while it is getting all the information. Hamming distance measures the length of the character from one to another mostly two binary strings or...

Words: 500 - Pages: 2

Free Essay

Postgraduate

...6. Durham: https://www.dur.ac.uk/study/postgraduate/taught/ 6. St Andrews: http://www.st-andrews.ac.uk/media/pgdegrees11-12.pdf 8. Warwick: http://www2.warwick.ac.uk/study/postgraduate/courses/coursea2z/#p 9. Lancaster: https://www.postgraduate.lancs.ac.uk/PGSearch.aspx 10. Exeter: http://www.exeter.ac.uk/postgraduate/degrees/taughtindexa/ 11. York: http://www.york.ac.uk/study/postgraduate/courses/ 12. Bath: http://www.bath.ac.uk/management/courses/postgraduate/ 13. Bristol: http://www.bristol.ac.uk/efm/postgraduate-programmes/ 14. Sussex: http://www.sussex.ac.uk/study/pg/2012/taught#a 15.Edinburgh: http://www.ed.ac.uk/studying/postgraduate/degrees?taught=Y&cw_xml=subjectarea.php 16.Nottingham No business http://pgstudy.nottingham.ac.uk/postgraduate-courses/schools-and-departments.aspx 17. Sheffield: http://www.sheffield.ac.uk/postgraduate/taught/courses/all 17. Leicester: http://www2.le.ac.uk/study/postgrad/taught-campus 19. Southampton: http://www.soton.ac.uk/postgraduate/pgstudy/programmes/index.html 20. Loughborough: http://www.lboro.ac.uk/study/postgraduate/courses/#p 21. Buckingham: http://www.buckingham.ac.uk/courses/ 22. Glasgow: http://www.gla.ac.uk/postgraduate/ 25. Newcastle: http://www.ncl.ac.uk/postgraduate/search/list/courses/taught 27. East Anglia: http://business.uea.ac.uk/courses 28.RoyalHolloway: http://www.rhul.ac.uk/studyhere/postgraduate/departmentsandcourses.aspx ...

Words: 333 - Pages: 2

Free Essay

Pdf of Telecom

...GSM BSS Network KPI (MOS) Optimization Manual INTERNAL Product Name GSM BSS Product Version V00R01 Confidentiality Level INTERNAL Total 36 pages GSM BSS Network KPI (MOS) Optimization Manual For internal use only Prepared by Reviewed by Reviewed by Granted by GSM&UMTS Network Performance Research Department Dong Xuan Date Date Date Date 2008-2-21 yyyy-mm-dd yyyy-mm-dd yyyy-mm-dd Huawei Technologies Co., Ltd. All rights reserved 2011-08-04 Huawei Technologies Proprietary Page 1 of 36 GSM BSS Network KPI (MOS) Optimization Manual INTERNAL Revision Record Date 2008-1-21 2008-3-20 Revision Version 0.9 1.0 Change Description Draft completed. The document is modified according to review comments. Author Dong Xuan Wang Fei 2011-08-04 Huawei Technologies Proprietary Page 2 of 36 GSM BSS Network KPI (MOS) Optimization Manual INTERNAL GSM BSS Network KPI (MOS) Optimization Manual Key words: MOS, interference, BER, C/I, power control, DTX, frequency hopping, PESQ, PSQM /PSQM+, PAMS Abstract: With the development of the radio network, mobile operators become more focused on end users’ experience instead of key performance indicators (KPIs). The improvement of the end users’ experience and the improvement of the network capacity are regarded as KPIs. Therefore, Huawei must pay close attention to the improvement of the soft capability of the network quality as well as the fulfillment of KPIs. At present, there are three...

Words: 9686 - Pages: 39

Free Essay

On Block Security of Regenerating Codes at the Mbr Point for Distributed Storage Systems

...On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems Son Hoang Dau∗ , Wentu Song† , Chau Yuen‡ Singapore University of Technology and Design, Singapore Emails: {∗ sonhoang dau, † wentu song, ‡ yuenchau}@sutd.edu.sg Abstract—A passive adversary can eavesdrop stored content or downloaded content of some storage nodes, in order to learn illegally about the file stored across a distributed storage system (DSS). Previous work in the literature focuses on code constructions that trade storage capacity for perfect security. In other words, by decreasing the amount of original data that it can store, the system can guarantee that the adversary, which eavesdrops up to a certain number of storage nodes, obtains no information (in Shannon’s sense) about the original data. In this work we introduce the concept of block security for DSS and investigate minimum bandwidth regenerating (MBR) codes that are block secure against adversaries of varied eavesdropping strengths. Such MBR codes guarantee that no information about any group of original data units up to a certain size is revealed, without sacrificing the storage capacity of the system. The size of such secure groups varies according to the number of nodes that the adversary can eavesdrop. We show that code constructions based on Cauchy matrices provide block security. The opposite conclusion is drawn for codes based on Vandermonde matrices. I. I NTRODUCTION A. Background In recent years, the demand...

Words: 4963 - Pages: 20

Free Essay

Coding Theory

...Coding Theory Ian Bathelt Math\221 02\16\2015 Cory Bennet Coding theory is the study of codes and their properties and their propensity to work with certain types of applications. There are four general types of coding that we as humans use. The four types are: line coding, error correction or channel coding, data compression, and lastly cryptographic coding. In relation to error detecting codes, there exist error-correcting codes. The purpose of this paper is to explain the different types of coding and go over hamming distance, perfect codes, generator matrices, parity check matrices, and hamming codes. We will also be giving examples of how coding theory could be applied in a real world application; and a brief history of coding theory. According to “Wolframmathworld” (2015) “Coding theory, sometimes called algebraic coding theory, deals with the design of error-correcting codes for the reliable transmission of information across noisy channels. It makes use of classical and modern algebraic techniques involving finite fields, group theory, and polynomial algebra”(). Coding theory has roots in communication filed. Claude Shannon first published the “A Mathematical Theory of Communication” in the Bell System Technical Journal. It was a piece that featured encoding information transmitted by a send. The fundamentals of this work included probability, which he applied to his communication theory. This gave way to Shannon developing what later became known...

Words: 1095 - Pages: 5

Premium Essay

Nt1330 Unit 3 Assignment 1

...digital by an Analog Telephone Adapter.An ATA is a simple device which lets you connect any standard telephone or fax machine so it can use VoIP through your internet connection. The ATA converts the analog signal from Alice’s voice to digital data I:e 0s and 1s. So that it can be further converted into data packets to be transmitted over the internet. Then the converted data packets are sent to the router or the Modem to be transmitted towards the destination. Discuss the quality of the Analog/Digital conversion in terms of the resources used (e.g., sampling rate and bit depth in PAM and PCM) Pulse-Code Modulation or PCM is a method to digitally represent sampled analogue signals It includes three steps: Sampling Quantization Coding Sampling: In the Sampling process the magnitude of the analogue signals is sampled at uniform intervals and the obtained values are called Samples For a 4 khz voice channel, the sampling rate is 8000 Hz which means the signal is sampled 8000 times per second. The samples will then be converted in digital numbers which is called the quantization process. Quantization: Quantization is a process to convert the obtained signals into discrete digital values. Bit Depth: The number of bits used to describe each sample in called Bit Depth. If the bit depth is higher more and more data will be stored and will re-create the sound more accurately. If the bit depth is low, the information will be lost and the reproduced sound will be degraded...

Words: 905 - Pages: 4

Free Essay

My Term Paper

...ASSESSMENT INFORMATION PACKAGE – EXAM 473 Copyright © 2010 U. S. Postal Service Contents • Preparing for the Examination • What to Expect in the Exam Room • Obligation to Provide Reasonable Accommodation for Qualified Applicants with a Disability • Frequently Asked Questions • Sample Test Questions Preparing for the Examination Read all the information in this package. Come to the test physically and mentally prepared. Get a good night’s sleep. On the day of the test, you will need to arrive at the testing center 15 minutes prior to the beginning of your appointment to allow time for the check-in process. Be sure to leave yourself enough time for traffic, finding the test center location, parking, and getting to the exam room. What to Expect in the Exam Room Upon arrival, you will be required to present one piece of state or U.S. Federal Government issued photo ID as specified in your appointment confirmation email. If you are a current USPS employee, you may bring your USPS ID badge. You will not be permitted to take the assessment if you do not present an ID meeting the stated requirements. Personal items are not allowed in the testing room. This includes all electronic devices such as cell phones, pagers, and PDAs. Please do not bring any unnecessary personal items to your assessment appointment as storage may not be available. We also ask that you not have anyone accompany you into the test center as there is not adequate space for visitors...

Words: 2869 - Pages: 12

Free Essay

Essay

...ensuring that the data provides meaning and value. Data preparation is the first part of the process of transforming data into useful knowledge. This process involves several steps: (1) data validation, (2) editing and coding, (3) data entry, (4) error detection, and (5) data tabulation. Data analysis follows data preparation and facilitates proper interpretation of the findings. Validation, editing, and coding of survey data. Data validation attempts to determine whether surveys, interviews, or observations were conducted correctly and are free from fraud. In recontacting selected respondents, the researcher asks whether the interview (1) was falsified, (2) was conducted with a qualified respondent, (3) took place in the proper procedural setting, (4) was completed correctly and accurately, and (5) was accomplished in a courteous manner. The editing process involves scanning of interviews or questionnaire responses to determine whether the proper questions were asked, the answers were recorded according to the instructions given, and the screening questions were executed properly, as well as whether open-ended questions were recorded accurately. Once edited, the questionnaires are coded by assigning numerical values to all responses. Coding is the process of providing numeric labels to the data so they can be entered into a computer for subsequent statistical analysis. Data entry procedures and how to detect errors. There are several methods...

Words: 1341 - Pages: 6

Free Essay

Qnt/351 Learning Team Assignment Week 2

...massive companies and businesses. The biggest problem they are facing is the turnover rate; which has increased in the last four months to over 64%. The employees are discouraged at BIMS, performance is low, there has been an increase in the use of sick leave, and the complaints from clients have increased. In order to find the root of the problem the company will run a survey among the workers asking questions such as: how they feel about the company, and questions regarding the low morale at work. The hypothesis is that employees do not feel content with the shifts and the low salaries. Instruments for Data Collection The instrument used for the data collection is a survey. The survey is given to all employees of BIMS in their paychecks. The survey has several questions where the employees is asked to rank the level on a scale of 1 to 5 with 1 the worst and 5 the best. The survey also has questions regarding gender, length of employment, and level of employment. The survey is optional and will give the employer an idea of how employees feel. The employees may answer some questions and not others. The survey will provide answers to what areas the employer needs to improve on, to increase moral. Level of Measurement Ordinal measurement for data is the type of data that consists of numerical scores that can be put in order with a natural order. In the case of Ballard Integrated Managed Services, Inc. Ordinal levels of measurement are used to categorize the outstanding...

Words: 952 - Pages: 4

Free Essay

Qnt351 Data Analysis

...analysis. The question seeking information about the respondent’s gender is a nominal-level question. “The nominal level of measurement observations of a qualitative variable can only be classified and counted” (Lind, Marchal, & Wathen, p. 10, 2011). For analytical purposes the order in which the data is displayed makes no difference. The question regarding the division of work for the respondent, and the question regarding if the respondent is a member of management or supervision is also nominal. Also, the question pertaining to length is service is nominal because it only seeks one answer. The ten questions relating to how each respondent feels is interval-level data. The ten questions ask each respondent to rate his or her individual feelings on a scale of one to five. One is considered very negative and five is considered very positive. This is known as a Likert Scale. The Likert Scale is the most popular form of survey data collection because it is easy to assemble, the scale is more reliable, and produce more interval-level data (Cooper & Schindler, 2011). Data Coding After collecting the data, Sally, one the office support staff, began the task of coding the data. While some values were pre-determined other values needed coding. In addition to the questions there were also filter question asked such as gender, length of service, if the respondent worked as a supervisor or in management, and in which division each person works. Questions 1-10 The...

Words: 734 - Pages: 3