2-1 research questions 2024
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
285
Subject
Computer Science
Date
Apr 29, 2024
Type
docx
Pages
3
Uploaded by DEEHAYES34 on coursehero.com
Deanna Williams
2-1 Practice Activity: Identifying Research Questions
SCS 285: Professor Lynne Barga
March 8, 2024
SCENARIO ONE
You are a social worker in an outpatient clinical setting. You receive referrals from juvenile court
counselors (also known as probation officers) to provide clinical assessments and therapy for juveniles aged 12 to 17 suspected of having a mental illness such as depression and/or a substance use disorder. In your work over the last several years, you noticed that when a youth has been in treatment for several months, they tend to have fewer arrests for crimes. You are interested in conducting a research study about what is at the core of this outcome.
What is your research question? What are the chances that the juveniles who participate in these outpatient clinic settings help reduce the arrests among juveniles?
Why do you think this is the research question being asked? Because after reading this scenario, further discusses that juveniles between the ages of 12 and 17 who are among these outpatient clinics are not being arrested for the crimes they commit as often as they should. Once a juvenile enters an outpatient clinic setting, it Is not necessarily true that they will change their behavior. If the consequences of their actions don’t change their way of decision-making, then they are only aware of the consequences but will make it up in their mind that they will continue to break the law.
SCENARIO TWO:
You are a caseworker responsible for investigating child abuse and neglect reports in your city. After team meeting discussions with fellow caseworkers, you noticed that when the report caseloads are high (over 50 cases per worker), there tend to be more substantiated cases of abuse
before the caseworker can get involved in the initial case management after adjudication. It often
takes one to two weeks before a caseworker can get involved in the case: This can be due to higher priorities among other cases, other caseworkers being out sick or on vacation, or the amount and type of paperwork involved. You are interested in knowing what can be improved to reduce the number of substantiated abuse cases and the time frame between report and actual involvement, which would minimize the likelihood of this abuse occurring.
What is your research question? Is it necessary to hire more help within the department to
reduce the caseloads being handled so long?
Why do you think this is the research question being asked? To determine why the caseloads are taking so long to be handled, not knowing if the child is in danger and needs immediate assistance. But having more help with the cases, it can help so these cases won't get overlooked. SCENARIO THREE
You are a health educator for your county’s public health department. You work with a team of nurses, social workers, dieticians, and other health educators to help reduce the rate of type 2 diabetes among adults who come to the clinic. You have often noticed that the children of parents
who have recently been diagnosed with type 2 diabetes tend to be overweight. You are interested in how eating habits in the family may change after a parent with diabetes is educated on proper diet to reduce weight.
What is your research question? What can be done to make sure that the children in the family won’t have to experience diabetes, how can healthy eating habits be implemented into the family?
Why do you think this is the research question being asked? This question is being asked to make sure that the parents are doing everything possible to make sure the next generation won’t be exposed to unhealthy habits.
SCENARIO FOUR:
You are a county commissioner for your county: You are responsible for keeping your county safe from crime and serving as an ambassador for its citizens. While meeting with the mayor and
your sheriff’s department and deputies, you were told that there has been an increase in human trafficking reports and arrests since the new interstate opened about six months ago. You want to know if there has been an increase in human trafficking happening among residents in your county, or if the increase is due to people traveling on the interstate and being caught while stopping in your county.
What is your research question? How has the new highway changed the rate of human trafficking?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Have you ever seen someone being bullied or harassed online by another person?
What did you think of the scenario at first? How did you determine that the victim of
bullying was already being mistreated before you intervened?
arrow_forward
Computer ethics question:
An amber alert is activated in your hometown (this is when a child goes missing and authorities issue a county-wide or state-wide search for that individual). All security cameras, traffic cameras, local police and the public try to find a white pickup truck with a broken left brake light and Florida license plates in order to quickly locate the missing child. (no, this is not Dave's car)
This would be an example of what type of data science practice?
arrow_forward
Have you ever seen an instance of internet bullying or harassment? To begin with, how did
you feel when you found out about the situation? How did you determine that the person
had been the victim of bullying before you got involved?
arrow_forward
Introduction to Computing Group Activity
Can Data Predict Your Grade?
background
As you move through your academic career, you leave an enormous swath of data: which courses
you chose to register for; which ones you looked at but didn't pick; and how you did on each
homework assignment, test, and project. Could this massive amount of data be analyzed to predict
your grade in a course? Could the data suggest which courses you should take next? Should those
predictions be public to your instructor, to you, and to financial aid officers?
research topics to consider
• Course Signals
• Degree Compass, Austin Peay State University
process
1. Divide the class into teams. Each team will select a webbased tool that allows access to
information.
2. Team members should each think of a situation where a person would benefit from the type
of results data mining can bring to a campus and a situation where it might be undesirable.
3. Team members should select the most powerful and best-constructed…
arrow_forward
Have you witnessed someone being bullied over the internet? What was your initial reaction? How did you realize that the person was already being bullied?
arrow_forward
Computer Science
Your supervisor has unveiled what she firmly believes is a great new plan that will improve what you do in your department (you may choose what type of business you are in based on your own career interests). After carefully studying the plan, however, you notice a number of potential pitfalls that are likely to make the plan fail (you choose the pitfalls). The problem is that your supervisor is extremely enthusiastic about the plan, and it appears that all of your colleagues are totally on board with it too. If you bring up your concerns, you are worried about being labeled as a negative person. At the same time, if you don't raise your concerns, there is a real chance that the plan will fail, causing real harm to your organization.
Your task is to write a message to your supervisor in the form of an email. In it, you will need to do all of the following.
Show appreciation for the hard work that went into the plan
Identify those aspects of the plan you believe…
arrow_forward
Computer Science
You are the project manager of a building construction project. A conflict has emerged between two key stakeholders due to their personal working styles. This conflict has been escalated to you and you should facilitate a satisfactory resolution.
Part A: Explain your resolution strategy. Part B: How would you address the issue.
arrow_forward
Computer science What are the key factors that an evaluator consider while evaluating a research proposal?
arrow_forward
Computer Science
Case Study
You are the programmer at a recreation center. This recreation center has a database that tracks classes, enrollment, cancellation, revenues, and expenses for each program or class. The database also tracks customer demographics. What type of evaluation would you conduct on an annual basis using the available data?
arrow_forward
Kickback Fraud The kickback is a form of fraud often associated with purchasing. Most organizations expect their purchasing agents to select the vendor that provides the best products at the lowest price. To influence the purchasing agent in his or her decision, vendors may grant the agent financial favors (cash, presents, football tickets, and so on). This activity can result in orders being placed with vendors that supply inferior products or charge excessive prices.
Required:
Describe the controls that an organization can employ to deal with kickbacks. Classify each control as either preventive, detective, or corrective.
arrow_forward
DRY infractions are those that fall outside of the guidelines.
Why do you think that is?
arrow_forward
Systems Analysis Assignment (Microsoft Word and Excel)
You and your team have been hired to set up a computer classroom for Tech United, Inc. An up
and coming tech startup who will like to become a tech training company.
Tech United, Inc. wants to offer various different kinds of tech training at their new office location.
They have only one classroom space available that can accommodate up to 30 students. The
classroom is already equipped with tables and chairs. The classroom, however, does not have any
computers, routers, projectors, smartboard etc. This is where you come in. The company has
$40,000 as a starting budget and will like for you to determine for them what
computers/keyboards/mouse/router/printer/smartboard etc. they should buy. You determine
based on their budget, how many of each item should be purchased for the classroom.
Deliverables
Deliverable Part 1: A systems analysis report on what kind of computers and hardware the
company should use in their classroom,…
arrow_forward
Warning- Don't use AI or copied answer. I'll report,if I see these things.
arrow_forward
Database ( Human Rights Association)
Drow diagram
And relations
arrow_forward
Case Study – Personal Trainer
Personal Trainer, Inc.
Fact-Finding Summary
A typical center has 300-500 members, with two membership levels: full and limited. Full members have access to all activities. Limited members are restricted to activities they have selected, but they can participate in other activities by paying a usage fee. All members have charge privileges. Charges for merchandise and services are recorded on a charge slip, which is signed by the member. At the end of each day, cash sales and charges are entered into the BumbleBee accounting software, which runs on a computer workstation at each location.
Daily cash receipts are deposited in a local bank and credited to the corporate Personal Trainer account. The BumbleBee program produces a daily activity report with a listing of all sales transactions. At the end of the month, the local manager uses BumbleBee to transmit an accounts receivable summary to the Personal Trainer headquarters in Chicago, where member…
arrow_forward
Troubleshooting in Daily Life
Troubleshooting is a technical term for solving a problem. Chances are you have already done some troubleshooting in your daily life.
What are some examples of troubleshooting that you have experienced? What were you trying to fix and why? When you were doing it, did you think of it as "troubleshooting" or not? If you did the same activity today, would you think of it as "troubleshooting" now? Could you provide documentation for someone else who may have had the same issue so they could resolve it? How would you do that? What would you include?
arrow_forward
It's hard not to second-guess your response when you witness pleas for aid from total strangers on social media, especially when those pleas are for money or medical treatment.
arrow_forward
Give examples of how to distinguish between facts, information, and knowledge by describing a situation that may be seen in your surroundings (family or community)
arrow_forward
Explain the call-to-action used in the PSA (Poverty Poster Program Invitation)
arrow_forward
Computer science What are some of the pros and cons of privatizing corrections?
arrow_forward
Personal Identification Techniques of fingerprinting unit tries to present different personal identification techniques, but there are still other methods that are not included. It is your task to look for these in the internet or other resources and provide a brief description to it. You need also to provide your sources.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Have you ever seen someone being bullied or harassed online by another person? What did you think of the scenario at first? How did you determine that the victim of bullying was already being mistreated before you intervened?arrow_forwardComputer ethics question: An amber alert is activated in your hometown (this is when a child goes missing and authorities issue a county-wide or state-wide search for that individual). All security cameras, traffic cameras, local police and the public try to find a white pickup truck with a broken left brake light and Florida license plates in order to quickly locate the missing child. (no, this is not Dave's car) This would be an example of what type of data science practice?arrow_forwardHave you ever seen an instance of internet bullying or harassment? To begin with, how did you feel when you found out about the situation? How did you determine that the person had been the victim of bullying before you got involved?arrow_forward
- Introduction to Computing Group Activity Can Data Predict Your Grade? background As you move through your academic career, you leave an enormous swath of data: which courses you chose to register for; which ones you looked at but didn't pick; and how you did on each homework assignment, test, and project. Could this massive amount of data be analyzed to predict your grade in a course? Could the data suggest which courses you should take next? Should those predictions be public to your instructor, to you, and to financial aid officers? research topics to consider • Course Signals • Degree Compass, Austin Peay State University process 1. Divide the class into teams. Each team will select a webbased tool that allows access to information. 2. Team members should each think of a situation where a person would benefit from the type of results data mining can bring to a campus and a situation where it might be undesirable. 3. Team members should select the most powerful and best-constructed…arrow_forwardHave you witnessed someone being bullied over the internet? What was your initial reaction? How did you realize that the person was already being bullied?arrow_forwardComputer Science Your supervisor has unveiled what she firmly believes is a great new plan that will improve what you do in your department (you may choose what type of business you are in based on your own career interests). After carefully studying the plan, however, you notice a number of potential pitfalls that are likely to make the plan fail (you choose the pitfalls). The problem is that your supervisor is extremely enthusiastic about the plan, and it appears that all of your colleagues are totally on board with it too. If you bring up your concerns, you are worried about being labeled as a negative person. At the same time, if you don't raise your concerns, there is a real chance that the plan will fail, causing real harm to your organization. Your task is to write a message to your supervisor in the form of an email. In it, you will need to do all of the following. Show appreciation for the hard work that went into the plan Identify those aspects of the plan you believe…arrow_forward
- Computer Science You are the project manager of a building construction project. A conflict has emerged between two key stakeholders due to their personal working styles. This conflict has been escalated to you and you should facilitate a satisfactory resolution. Part A: Explain your resolution strategy. Part B: How would you address the issue.arrow_forwardComputer science What are the key factors that an evaluator consider while evaluating a research proposal?arrow_forwardComputer Science Case Study You are the programmer at a recreation center. This recreation center has a database that tracks classes, enrollment, cancellation, revenues, and expenses for each program or class. The database also tracks customer demographics. What type of evaluation would you conduct on an annual basis using the available data?arrow_forward
- Kickback Fraud The kickback is a form of fraud often associated with purchasing. Most organizations expect their purchasing agents to select the vendor that provides the best products at the lowest price. To influence the purchasing agent in his or her decision, vendors may grant the agent financial favors (cash, presents, football tickets, and so on). This activity can result in orders being placed with vendors that supply inferior products or charge excessive prices. Required: Describe the controls that an organization can employ to deal with kickbacks. Classify each control as either preventive, detective, or corrective.arrow_forwardDRY infractions are those that fall outside of the guidelines. Why do you think that is?arrow_forwardSystems Analysis Assignment (Microsoft Word and Excel) You and your team have been hired to set up a computer classroom for Tech United, Inc. An up and coming tech startup who will like to become a tech training company. Tech United, Inc. wants to offer various different kinds of tech training at their new office location. They have only one classroom space available that can accommodate up to 30 students. The classroom is already equipped with tables and chairs. The classroom, however, does not have any computers, routers, projectors, smartboard etc. This is where you come in. The company has $40,000 as a starting budget and will like for you to determine for them what computers/keyboards/mouse/router/printer/smartboard etc. they should buy. You determine based on their budget, how many of each item should be purchased for the classroom. Deliverables Deliverable Part 1: A systems analysis report on what kind of computers and hardware the company should use in their classroom,…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning