Quantitative data refers to
(i) Graphs and tables
(ii) Any data you present in your report
(iii) Statistical analysis
(iv) Numerical data that could be useful to answer your research question(s)
and to meet your Objectives

1 Answer

Answer :

(iv) Numerical data that could be useful to answer your research question(s)
and to meet your Objectives

Related questions

Description : On the basis of time, research can be classified as, (i) Qualitative versus Quantitative (ii) Pure versus applied research (iii) Cross-sectional versus longitudinal research (iv) None of the above

Last Answer : (iii) Cross-sectional versus longitudinal research

Description : Research design of a study should not include (i) Objectives (ii) Hypothesis (iii) Findings (iv) Blue print of Research

Last Answer : (iii) Findings

Description : Bibliography given in a research report (i) Helps those interested in further research and studying the problem (ii) Makes the report authentic (iii) Both (i) & (ii) (iv) None of the above

Last Answer : (iii) Both (i) & (ii)

Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these

Last Answer : iv) All of these

Description : Which of the following is the first step in starting the research process? (i) Searching sources of information to locate problem. (ii) Survey of related literature (iii) Identification of problem (iv) Searching for solutions to the problem

Last Answer : (ii) Survey of related literature

Description : The aims of research is/are (i) verification (ii) fact finding (iii) theoretical development (iv) All of the above

Last Answer : (iv) All of the above

Description : Social research can be divided into- (i) Two categories (ii) Three categories (iii) Four categories (iv) Five categories

Last Answer : (iii) Four categories

Description : Research is basically- (i) A methodology of enquiry (ii) Search of truth (iii) A systematic exploration of facts (iv) All of the above

Last Answer : (iv) All of the above

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : Managing a patients record can be helpful as i) The patients data can be easily shared between the doctors ii) The patients need to pay a heavy charge for maintain the records iii) It may be difficult to search and retrieve the patient’s records. iv) None of these

Last Answer : i) The patients data can be easily shared between the doctors

Description : Data collection can be done through (i) Interview (ii) Questionnaires (iii) Through E-Mail or by Telephone (iv) All of the abov

Last Answer : (iv) All of the above

Description : Software are referred to as i) Hardware ii) Computer programs iii) Binary data iv) procedure

Last Answer : ii) Computer programs

Description : Method used to transfer information to far off places instantly is called i) Information technology ii) Language iii) Data iv) Telecommunication

Last Answer : iv) Telecommunication

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry

Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these

Last Answer : i) They use robots and barcodes

Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence

Last Answer : i) Foreign technology and culture are going heavy on our culture

Description : ICT is helpful in i) Doing more amount of work and accomplishing the task quickly. ii) Analyzing information iii) Learning computer skills iv) All of these

Last Answer : iv) All of these

Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C

Last Answer : iv) Both A & C

Description : The use of computers, internet and other communication technologies to provide medical care to patients at distance is known as i) Telecommunication ii) Telemedicine iii) Expert systems iv) None of these

Last Answer : ii) Telemedicine

Description : The drawbacks of ICT in medicine are i) Part time staff may not be trained and cannot access vital information ii) Some staff may be resistant of using ICT iii) All staff will need training in the use of the software iv) All of these

Last Answer : iv) All of these

Description : Expert systems provides the functionalities of? i) The system provides medicine to the patients ii) The expert system consults the doctor immediately. iii) Medical staffs inputs patients symptoms iv) None of these

Last Answer : iii) Medical staffs inputs patients symptoms

Description : ICT is a combination of i) IT and Telecommunication ii) IT and Business iii) Information and Knowledge iv) None of These

Last Answer : i) IT and Telecommunication

Description : Teleconferencing can be helpful in i) Business Domain ii) Health Sector iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : ICT has been an essential necessity for i) Communication at long distances ii) Employing IT and its services to the rural areas iii) Providing medical help to nurses and staffs for treatments iv) All of these

Last Answer : iv) All of these

Description : How many models are for technological innovation- (i) Two (ii) Three (iii) Four (iv) None of the above

Last Answer : (ii) Three

Description : One of the following is not a survey method (i) Personal interview (ii) Telephone interview (iii) Mail interview (iv) Structured observation

Last Answer : (iv) Structured observation

Description : Field study is related to (i) Real life situations (ii) Experimental situations (iii) Laboratory situations (iv) None of the above

Last Answer : (i) Real life situations

Description : This invention replaced vacuum tubes and made computers much smaller and faster. However, it was eventually replaced by another invention (i) RAM (ii) ENIAC (iii) Transformer (iv) Transistor.

Last Answer : (iv) Transistor.

Description : Disaster management is aimed ata. Resettling people in the closest unaffected urban area a. Resettling people in the closest unaffected urban area b. Collection of valuable data for future ... a future disaster d. Restoring a communitys services, facilities and residences to pre-disaster levels

Last Answer : d. Restoring a communitys services, facilities and residences to pre-disaster levels

Description : Which zone is considered the highest vulnerability zone of the seismic zonation map of India? (a) Zone-IV (b) Zone-V (c) Zone-III (d) Zone-

Last Answer : (b) Zone-V

Description : The main objectives of First Aid? a. To preserve life b. To prevent the victims condition from worsening c. To promote recovery d. All the above

Last Answer : d. All the above

Description : What does the acronym ISDR stand for? a) International Significant Disaster Resources b) International Sustainable Development Report c) International Strategy for Disaster Reduction d) Intergovernmental Strategy for Developing Recreation

Last Answer : c) International Strategy for Disaster Reduction

Description : According to World Disasters Report of 2010, during 2000-09, 85% of affected people belonged to the? a. Asia Pacific Region b. African region c. Japan region d. Australian region

Last Answer : a. Asia Pacific Region

Description : Report on Training on Search and Rescue for the members of the village Disaster Management Team is prepared by? a. Govt. of Manipur b. Govt. of Indonesia c. Govt. of Uttaranchal

Last Answer : c. Govt. of Uttaranchal

Description : The process of identifying the probability of occurrence of a natural hazard of a given intensity at a specific location based on an analysis of natural processes and site conditions is termed as- (a) Disaster calculation (b) Hazard Assessment (c) Hazard calculation (d) None of the above

Last Answer : (b) Hazard Assessment

Description : Flood risk refers to: a) The chance of a flood occurring b) The number of people and properties exposed to floodwaters if a flood occurs c) The vulnerability of people and properties that are exposed to floodwaters d) All of the above.

Last Answer : d) All of the above.

Description : The two general approaches to forecasting are…….. (a) qualitative and quantitative ; (b) mathematical and statistical (c) judgmental and qualitative ; (d) judgmental and associative

Last Answer : (a) qualitative and quantitative ;

Description : Which of the following best describes quantitative research? a. the collection of non-numerical data b. an attempt to confirm the researcher’s hypotheses c. research that is exploratory d. research that attempts to generate a new theory

Last Answer : b. an attempt to confirm the researcher’s hypotheses

Description : What is a Research Design? (A) A way of conducting research that is not grounded in theory. (B) The choice between using qualitative or quantitative methods. (C) The style in which you present your research ... e.g. a graph. (D) A framework for every stage of the collection and analysis of data. 

Last Answer : (D) A framework for every stage of the collection and analysis of data.