Premium Essay

Reseach Methods

In:

Submitted By mwauphil
Words 62976
Pages 252
UNIVERSITY OF NAIROBI
COLLEGE OF EDUCATION AND EXTERNAL STUDIES
SCHOOL OF CONTINUING AND DISTANCE EDUCATION
DEPARTMENT OF EXTRA-MURAL STUDIES.

In collaboration with

CENTRE FOR OPEN AND DISTANCE LEARNING

MASTER IN PROJECT PLANNING AND MANAGEMENT

COURSE: LDP 603: RESEARCH METHODS

Authored by:
Dr. Christopher Mwangi Gakuu
Senior Lecturer, Department of ExtraMural studies, University of Nairobi
&
Dr. Harriet Jepchumba Kidombo
Senior Lecturer, Department of Educational Studies
University of Nairobi

Page 1 of 240

GENERAL INTRODUCTION TO THE COURSE MODULE
The Research Methods course is one of the first semester core courses for those learners pursuing the Master in Project Planning and Management course. You are aware that any good decision is based on facts. Facts are based on data. The data must be systematically collected, processed, analysed and presented for use. The best-known way of collecting empirical data is through scientific research methods. This is what this course module is all about.
The main aims of this course unit is to:
1. Providing you with the basic information needed to understand the research process.
2. Enable you to use the knowledge to design their own research agenda on an area of personal interest or that of an organization.
MODULE STRUCTURE
The module is covered in Lectures. Each Lecture focuses on area in research. You will note that in each unit, there is an introduction, unit objectives, contents presented in subtopics, activities, summary and suggestions for further readings. This structure aims at making it easy for you to read the material more easily and logically. In each Lecture you will find some activities or exercises that you should go through before starting the subsequent unit. It is advisable that you answer all the questions and check the answers from the various sources i.e.,

Similar Documents

Premium Essay

Reseach Method

...1. What is the nature of the investment that is under consideration and what are the sources of value (cost savings and revenue increases)? The investment proposed by Bob Prescott, an on-site long wood woodyard, would reduce operating costs by processing tree-length logs, as well as increase revenues by selling short wood. Cost Savings: In 2006, Worldwide Paper’s Blue Ridge Mill had to purchase shortwood from competitor, Shenandoah Mill. The new woodyard would begin operations in 2008, thus saving Blue Ridge Mill $2mm in year one and $3.5mm the years after. The savings would come from the difference in the cost of producing shortwood on-site versus purchasing it on the open market. Revenues: Revenues would be generated by taking advantage of the excess production capacity by selling shortwood on the open market as soon as possible. Blue Ridge Mill would show expected revenues of $4mm in 2008 and $10mm from 2009 – 2013. On paper this projectseemed like a can’t miss investment. 2.What are the yearly cash flows that are relevant for this investment decision? Itemize the cash flows for each of the six years of the investment. Do not forget the effect of taxes and the initial investment amount. Please show your numbers. There are several cash flows in this project that need to be included in the discounted cash flow analysis: Capital Spending – Though the capital spending for the project will be $18M, only $16M of it will be spent in 2007; the remainder...

Words: 350 - Pages: 2

Free Essay

The Journey of a Music Teacher

...Riki Shafier Professor Kimberlee Hoftiezer SOS-110 24 January 2016 Music Education: A Personal Journey For the past few years I have been taking different courses, learning many things and preparing myself for the life ahead of me.  As a soon-to-be college graduate, the future beckons, bright and inviting. There are endless career opportunities that await those who have put forth the effort to receive an education. The career goals toward which I am currently preparing are to become a highly sought-after piano teacher and piano-teacher trainer with a full roster of students, complete with a waiting list for those who wish to join my studio. I plan to build a fully- developed business model for my piano studio. This plan will include curricula for various ages and skill levels, as well as plans for accommodating specific needs of individual students. The plan will also have processes for the acceptance and rejection of potential students, registration and payment options, and online booking opportunities. This will be optimized through the use of technology. Technology, in all its many forms, has transformed the world we live in, and I anticipate that it will prove to be of great use to me in the development of my career goals. In the short-term, I will be able to train under experienced piano educators and teacher-trainers via Skype lessons and workshops, and use various training software programs to improve my technical and teaching skills. Additionally, I plan to...

Words: 849 - Pages: 4

Free Essay

Lol Girl

...Blue Pelican Java by Charles E. Cook Version 3.0.5h Copyright © 2004 - 2008 by Charles E. Cook; Refugio, Tx (All rights reserved) 1-1 “Blue Pelican Java,” by Charles E. Cook. ISBN 1-58939-758-4. Published 2005 by Virtualbookworm.com Publishing Inc., P.O. Box 9949, College Station, Tx 77842, US. ©2005, Charles E. Cook. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, recording or otherwise, without the prior written permission of Charles E. Cook. Manufactured in the United States of America. Preface You will find this book to be somewhat unusual. Most computer science texts will begin with a section on the history of computers and then with a flurry of definitions that are just “so many words” to the average student. My approach with Blue Pelican Java is to first give the student some experience upon which to hang the definitions that come later, and consequently, make them more meaningful. This book does have a history section in Appendix S and plenty of definitions later when the student is ready for them. If you will look at Lesson 1, you will see that we go right to work and write a program the very first day. The student will not understand several things about that first program, yet he can immediately make the computer do something useful. This work ethic is typical of the remainder of the book. Rest assured that full understanding...

Words: 31284 - Pages: 126

Premium Essay

Research Paper

...Researching Variable Naming Rules Visual Basic You must use a letter as the first character. You can't use a space, period (.), exclamation mark (!), or the characters @, &, $, # in the name. Name can't exceed 255 characters in length. Generally, you shouldn't use any names that are the same as the functions, statements, and methods in Visual Basic. You end up shadowing the same keywords in the language. To use an intrinsic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Precede the intrinsic function, statement, or method name with the name of the associated type library. For example, if you have a variable called Left, you can only invoke the Left function using VBA.Left. You can't repeat names within the same level of scope. For example, you can't declare two variables named age within the same procedure. However, you can declare a private variable named age and a procedure-level variable named age within the same module. Python  Must begin with a letter (a - z, A - B) or underscore (_)  Other characters can be letters, numbers or _  Case Sensitive  Can be any (reasonable) length  There are some reserved words which you cannot use as a variable name because Python uses them for other things.- See more at: http://www.w3resource.com/python/python-variable.php#sthash.5AXuVlWN.dpuf Java Variable names are case-sensitive. A variable's name can be any legal identifier — an unlimited-length...

Words: 724 - Pages: 3

Free Essay

Sd2720 Module 3 Working with Methods

...SD2720 Module 3 Working with Methods Click Link Below To Buy: http://hwcampus.com/shop/sd2720-module-3-working-with-methods/ SD2720 Module 3 Working with Methods and Encapsulation Lab 3.1 Creating a Method In this lab, you will complete two tasks related to Java methods. The tasks performed in this lab will help you use method overloading and understand ambiguous overloading. Task 1 Write a program for swapping two numbers. In the program: • Create a method by passing primitive values as parameters for checking the result. • Create another method by passing object references as parameters for checking the result. • Identify the difference between two outputs. Task 2 Write a Java program that accepts 10 numbers from the user and finds the greatest and smallest numbers among them. Create two methods, findGreatest() and findSmallest(), to find the greatest and smallest numbers, respectively. Task 3 Write a Java program that implements the following methods: • getNumbers()to accept two numbers from the user. • calculateHCD()to calculate the highest common divisor (HCD) of the two numbers. Please note that it should be a recursive function. • calculateLCM()to calculate the least common multiple (LCM) of the two numbers. Display()to display HCD and LCM. Submission Requirements: Compress your Java project folder and responses in a Microsoft Word document into one zipped folder and submit it to the instructor. Evaluation Criteria:...

Words: 384 - Pages: 2

Free Essay

Java Programming

...A Programmer’s Guide to Java™ SCJP Certification Third Edition This page intentionally left blank A Programmer’s Guide to Java™ SCJP Certification A Comprehensive Primer Third Edition Khalid A. Mughal Rolf W. Rasmussen Upper Saddle River, New Jersey • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sidney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United...

Words: 15086 - Pages: 61

Free Essay

Visual Basic

...Visual Basic – Messages and data input/output Introduction One way for a user to communicate with a procedure is via a dialogue box. The easiest way to do this in VB is to use one of the pre-defined ones. VB has two kinds, a Message box and an Input box. Message box The MsgBox function displays a message, waits for the user to click a button and returns a value indicating which button has been chosen. The simplest MsgBox contains only a message string and an OK button. The general syntax is MsgBox(prompt [,buttons] [,title]), where the quantities within [] are optional arguments, with prompt: string expression displayed in the message (max length 1024 characters) buttons: numerical expression that is sum of values specifying the type of buttons to display, title: string expression displayed in the title bar. Some of the button values are given below. (For a full list see the Help file). Value Constant Display 0 vbOKOnly OK button only 1 vbOKCancel OK and Cancel buttons 3 vbYesNoCancel Yes, No and Cancel buttons 4 vbYesNo Yes and No buttons 32 vbQuestion Query icon 48 vbExclamation Warning message icon 0 vbDefaultButton1 First button is default 256 vbDefaultButton2 Second button is default 512 vbDefaultButton3 Third button is default The value returned by the MsgBox function depends on the button pressed. Some values are listed below. Button selected Value Constant OK 1 vbOK Cancel 2 vbCancel Yes 6 vbYes No 7 vbNo The MsgBox function can be used as a simple debug tool. To...

Words: 930 - Pages: 4

Premium Essay

Cis170 Final Exam Guide

.... MC 1. (TCO 13) Text files are what type of file? 4 Points : Sequential Random access Binary Consecutive Instructor Explanation: Lecture / Chapter 13 Edit 3. MC 1. Delete (TCO 13) To create an input file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 4. MC 1. Delete (TCO 13) To create an output file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 5. MC 1. Delete (TCO 13) The header file that defines the classes for processing and manipulating files is called the _____. 4 Points : Instructor Explanation: Chapter 13.1 Introduction Edit 6. 7. 8. MC 2. Delete (TCO 13) What do the following statements accomplish? ifstream theFile; theFile.open( myFile.txt , ios::in); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit 9. MC 2. Delete (TCO 13) What do the following statements accomplish? ofstream theFile; theFile.open( myFile.txt , ios::out); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit...

Words: 2540 - Pages: 11

Premium Essay

Pt1420 Unit 2 Research

...Kelli Okuly PT1420 Unit 2 Research Assignment 12-5-2014 Variable naming conventions vary from program to program. In Visual Basic the variable must begin with a letter and you cannot use a space, period (.), or the characters !, @, &, $, # in the name. Visual Basic variable names must be under 255 characters long. You shouldn't use any names that are the same as the functions, statements, and methods in Visual Basic. You end up shadowing the same keywords in the language. To use a basic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Precede the fundamental function, statement, or method name with the name of the associated type library. For example, if you have a variable called “Left”, you can only use the “Left” function using “VBA.Left”. In Python, variables must begin with a letter or underscore (_). Other characters can be letters, numbers, or the underscore. Python variables are case sensitive and can be any length, within reason. There are several keywords in Python that are reserved for other functions and cannot be used as variables. For example; print, def, from, not, and return. Variables in Java are referred to as Identifiers. In Java the variable must begin with a letter, an underscore, or a dollar sign ($) although a letter is typically what is used. The other characters may be letters or numbers, no spaces or special characters are allowed. Java identifiers can be any length within...

Words: 405 - Pages: 2

Free Essay

Case Study

...Layout Planning Models, Algorithms and computerized l h d d Layout Planning References 1. Tompikins et al., Facility Planning, 3rd edition, John Wiley & Sons Ltd., Singapore,2003. i 2003 2. Richard L.Francis et al., Facility Layout and Location: an analytical d diti approch, 2nd edition, P ti H ll of I di Ltd 2002 h Prentice Hall f India Ltd., 2002. 3. Dr-Ing. Daniel Kitaw, Industrial Management and Engineering Economy 4-1 Introduction • The generation of layout alternatives is a critical step in the facilities planning process, since th l i th f iliti l i i the layout t selected will serve to establish the physical relationships between activities. 4-2 CONT’D • Which comes first, the material handling system or the facility layout?  Centralized versus decentralized storage of work in i process(WIP), t li (WIP) tooling, and supplies d li  Fixed path versus variable path handling  The degree of automation used in handling  The type of level of inventory control physical control, control, and computer control of materials. 4-3 Layout procedures • A number of different procedures have been developed to id the facilities l t aid th f iliti planner i d i i l in designing layouts. t  Construction type  Improvement type 4-4 Apples plant layout procedure • • • • • • • • • • Procure th b si d t P the basic data Analyze the basic data Design the productive process Plan the material flow pattern Consider the handling l h dli plan general material •...

Words: 2488 - Pages: 10

Free Essay

Fundamentals

...Assignment 1: Fundamentals of Effective Communication in the Workplace Professor BUS 100 – Introduction to Business May 13, 2014 I work for a defense attorney, and I experience effective communication on a daily basis via email with co-workers and clients. However, I do feel that face-to-face communication is highly effective and important. With face-to-face meeting, the co-workers and clients directly receive the message, and feedback is instantly provided. Resolutions can be made easier during a face-to-face meeting rather than via email or phone conversations. About six months ago I was part of a financial turn around that was a result of successful face-to-face communication. The firm’s office that I work for is called McCallum Law Offices, and my position in the department is senior paralegal and office manager. We work closely with the justice department and handling the financial and critical situations of our client’s lives. A main part of my job was to reconcile financial reports, and have the senior attorney approve them, and then submit them for reimbursement. We were having major issues with the financials and how they accounts were being handled. As with most offices now communication is usually handled via e-mail. When you start having issues like we were, there is only one way to handle this and that is for everyone to be face to face. So if there are any issues they can be resolved immediately. Attorney offices can become very hectic...

Words: 526 - Pages: 3

Free Essay

Nbgnhgbhg

...C# Development Rob Miles Edition 1.1 October 2009 Department of Computer Science University of Hull i Contents Introduction...................................................................................................................... 11 Welcome ............................................................................................................. 11 Reading the notes................................................................................................ 11 Getting a copy of the notes ................................................................................. 11 Computers 12 An Introduction to Computers .......................................................................................... 12 Hardware and Software ...................................................................................... 12 Data and Information ........................................................................................................ 13 Data Processing .................................................................................................. 13 Programmer’s Point:At the bottom there is always hardware ............................. 14 Programming Languages 15 What is Programming? ..................................................................................................... 15 From Problem to Program .................................................................................. 15 Programmer’s Point:The specification must always be there...

Words: 63379 - Pages: 254

Premium Essay

Craked. Com - 6 Ways Societ Brainwashes You

...Craked.com – 6 ways Society Brainwashes You In this article, 5 different methods of social engineering are explored. The first is “Chanting Slogans”. This is considered a method of brainwashing because when chanting a repetitive slogan, the repetitive task keeps your brain busy, instead of considering what has just been said by the analytical part of your brain. This is often used in political stump speeches and conventions with live audiences. The second method mentioned is “Slipping things into your Subconscious”. A sly technique used by headline writers to place and reinforce a certain idea in the reader’s head without them noticing. Also called “Source Amnesia” this method exploits the brain’s weak capacity to remember things, but not remember the context in which we learned them. The third process of social engineering the author considered was “Keeping You in Line with Shame”. This involves the “appeal to ridicule fallacy” where the speaker ridicules his/or her opponent’s point, and thus the listener is more likely to agree, in fear of being on the side of the ridicule. The fourth method analyzed is called “Black and White choices”. The psychology behind this is that when people are in debate, they paint an idea or person or place as all bad or all good. Therefore, people are less likely to consider the multiple complex layers of an idea if it is wholly labeled as “bad”. The last and final method is “Us versus Them”. This is the idea that humans naturally form groups within...

Words: 299 - Pages: 2

Premium Essay

Not Finished

...The author Abstract Terms of reference This report was written on the instructions of Jill Sinclair, a tutor of Professional issues in nursing BN 511 at Sourther Institute of Technology. This report was assigned during orientation week in Fbruary 2015. The aim is to demonstrate that the author is compentant in research by, cdemonstrating the ability to use relevant search parameters in suitable databases. Identify and discuss the not only the methodology but the ethical and legal considerations relating to the said research topic . To understand key components of the research design and discuss the current and/or future implications on nursing practise. The report is to be submitted by 8th June 2015 no later than 1600hrs in assignment box C2-06 Database search procedure The course of action undertaken to find the research study ‘Older persons have ambivalent feelings about the use of monitoring technologies’ are as follows: The author logged onto the Mysit webpage located at web address https://student.sit.ac.nz/MySIT/pages/Home.aspx The author then selected the Study and Course Resources hyperlink on the on the web address https://student.sit.ac.nz/MySIT/pages/MyStudy.aspx t The author then found several further options. The option chosen was Health and Sport under the Online Data bases As the summative assessment required a research article that related to innovation, implementation or delivery of contemporary technology in nursing, the CINAHL (Nursing &...

Words: 627 - Pages: 3

Premium Essay

Disaster

...MZUMBE UNIVERSITY SCHOOL OF PUBLIC ADMINISTRATION AND MANAGEMENT A RESEACH PROPOSAL AN INVESTIGATION ON CHALLENGES FACING ORGANISATIONS IN THE USE OF ELECTRONIC RECORDS A CASE STUDY OF MZUMBE UNIVERSITY PREPARED BY, NAME : HAPPY D. MITUNU REG. No. : 11341/T.10 COURSE : BPA – RAM II SUBJECT : PUB 220 DATE : 5TH JUNE 2012 TABLE OF CONTENT 1.0. STATEMENT OF THE PROBLEM 2.1. RESEARCH OBJECTIVES 2.2.1. GENERAL OBJECTIVE 2.2.2. SPECIFIC OBJECTIVE 2.2. RESEARCH QUESTION 2.3. RESEARCH METHODOLOGY AND PROCEDURE 2.4.3. RESEARCH DESIGN 2.4.4. AREA OF THE STUDY 2.4.5. TARGET POPULATION 2.4.6. SAMPLE, SAMPLE AND SAMPLE TECHNIQUES 2.4.7. METHOD OF DATA COLELCTION 2.4.8.1. QUESTIONARE 2.4.8.2. INTERVIEW 2.4.8.3. OBSERVATION 2.4.8.4. DOCUMENTARY 2.4.8. ANLAYSIS OF DATA 3.3.6.1. QUALITATIVE DATA ANALYSIS 3.3.6.2. QUANTITATIVE DATA ANALYSIS 1.0. STATEMENT OF THE PROBLEM For any organization to have good performance and continue to operate well it needs to keep records concerning any activity taking place in a specific organization. The development of technology makes the need of using electronic form to keep records in order to expand the methods of creating, editing, maintaining, transmitting and retrieving the records. Records may be found on a variety of media...

Words: 1142 - Pages: 5