Explain the characteristics of the sampling risk

Assignment Help Computer Engineering
Reference no: EM131624965

Question: Sampling and Nonsampling Risk. You are conducting a research study to determine the effect of a two-week workout and diet regimen on the weight loss experienced by individuals between the ages of 30 and 35 years. Health Busters, a local fitness club, has allowed you access to some of its members for their voluntary participation. Your research study will use the following methodology:

1. Solicit participation from health club members.

2. Ask members who agree to participate to weigh themselves and self-report their weight to you at a specific time.

3. Provide members a scheduled set of workouts and dietary restrictions for the upcoming two weeks.

4. Via telephone survey, obtain the members' weights following the two-week period.

5. Based on the initial weight measurement and final weight measurement, calculate the net weight gain or loss.

Required: a. How would each of the following characteristics of the methodology affect sampling risk and nonsampling risk?

1. You solicited member participation during the early morning hours when most of the members working out were doing so before going to work that day.

2. Males constituted 85 percent of your sample.

3. The health club is located near downtown where most residents are either single or married without children.

4. Because of traffic, expensive parking, and reasonable proximity of their homes to their offices, most of the patrons walk to their offices (or, in inclement weather, take taxicabs or public transportation).

5. Because of privacy concerns, you agreed to allow participants to self-report their initial and final weight measurements.

6. Because of time constraints, you were unable to monitor participants' workouts or diets during the two-week period.

b. Suggest some improvements to the methodology described to reduce potential exposure to sampling risk and nonsampling risk.

Reference no: EM131624965

Questions Cloud

Expected rate of return on diversified industries : There is a 5 percent probability of a boom and a 70 percent chance of a normal economy. What is your expected rate of return on your Diversified Industries.
Problem related to sampling and nonsampling risk : Sampling and Nonsampling Risk. Arthur Castle is interested in identifying the average number of family members living in each household in his neighborhood.
Discuss importance of having long term strategic sourcing : Discuss the importance of having long term strategic sourcing relationships (consider the need for the 'technology of care).
Stock market price prior to the recapitalization : Assume that the shares are repurchased at a price equal to the stock market price prior to the recapitalization.
Explain the characteristics of the sampling risk : Sampling and Nonsampling Risk. You are conducting a research study to determine the effect of a two-week workout and diet regimen on the weight loss.
Discuss which ratios and trends are most useful : Identify two companies that compete with each other in the same industry - Show your work. Discuss which ratios and trends are most useful
Journalize the january transactions : Vista Company installed a standard cost system on January 1. Required - Journalize the January transactions
How management accounting performs the functions : Explain and illustrate with an example how management accounting performs the functions - discuss financial and non-financial factors in solving the problem
Constant requests for information : Although you get frustrated at times with your CEO's constant requests for information, it is your job as a CFO to analyze that data for her.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to designs a communincation methodology

What if someone creats a communincation methodology that does not comply with OSI but is compatable with the application layer and the physical layer. What will be problems if any? in both Local network and in Internetworking.

  A user comes to you and explains that she needs some form

a user comes to you and explains that she needs some form of encrypted file system to store sensitive information on a

  Make a computer systems to control sections of rail track

A large corporation used to make computer systems to control sections of rail track. The designers of these systems were not permitted to use interrupts.

  Why do you think that your hard drive is not using fifo

why do you think that your hard drive is not using fifo? there are programs available that will disable fifo. if you

  Demonstrate your understanding of conditional executio

This is a project that requires using http://snap.berkeley.edu to complete. The program should demonstrate your understanding of conditional execution with one or more if blocks.

  Draw an automaton that recognizes precisely

Draw an automaton that recognizes precisely the following language: strings, from the alphabet {a, b}, which contain a substring with at least 2 consecutive b's

  Discuss pros and cons of completing a stakeholder analysis

Discuss the pros and cons of completing a stakeholder analysis. In your discussion, explain why stakeholder analysis is an important step in the action.

  What is definition of uml and ood

Requirements Analysis: includes of collecting requirements, interviewing customers, and selecting a DBMS system.

  The australian commonwealth government has developed a

the australian commonwealth government has developed a cloud computing strategy and cloud computing policy and you as

  Describe the key analogies the monitors expose to users

Describe the key analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen. Determine the conceptual model that you would use when designing a product for your restaurant.

  Design of an operating system performance evaluation

The Design of an Operating System Performance Evaluation and Analysis - What is the significance of the topic as related to the field of computer science and industry?

  Rsa cryptosystem

Assume that we tried to simplify the RSA cryptosystem by making use of just a prime p in place of the composite modulus N = pq. As in RSA, we could have an encryption exponent e which is relatively prime to p − 1.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd