Sie sind auf Seite 1von 11

Table of Contents

Table of Contents
Report
Hypothesis
Constraints and Scope
Key Findings
Conclusion
A collection of data sets
Data Collection Methods
Data Organisation
Data Manipulation
Data Validation
File Management Security
Legal Requirements
Project Plan
Appendix 1 - Survey (Primary
Data)
Appendix 2 Codified Data
Appendix 3 - Data Set
(Secondary)
Reference List


Report
Background
It is a difficult process going through year 12 as a student. So, I was interested
to know how the students sleeping habits affect their performance at school.
So I can make sure I wasnt the only one who tried to stay awake in class.

HYPOTHESIS
If sleeping habits lowers test performance, and I do have bad sleeping habits,
then I will get a low grade on the test.

CONSTRAINTS AND SCOPE

The scope of this project is that it will be held in schools since this survey is
about school tests and their sleeping habits and also other various educational
premises such as the local libraries in the northern suburbs of Victoria, this
survey is not restricted in age groups; so it is for everyone. It includes various
constraints such as time it can be a big barrier, also money to print out the
surveys.

KEY FINDINGS
I found out that most people prefer evening shift classes because they have
more time to do their own things and get more sleep. Also the higher the
education level the more responses are ticked on to evening shift classes
expressing that students tend to have higher stress and less sleep on their

PAGE 1
previous day.

CONCLUSION
Based on my hypothesis I have found out that most people do agree on bad
sleeping habits do affect study performance because of several reasons such
as: they get less sleep, they dont sleep well enough on the night before, they
get low score on the exam because of less than 7 hours of sleeping. The x axis
reveals the scale of not agreed agreed (0-9) and the Y axis represent the
number of people who have voted in each of the section. This graph below
clearly shows that most people tend to agree to this statement

PAGE 2

PAGE 3
A collection of data sets
DATA COLLECTION METHODS
I used up a very common way of collecting and that was the Survey method with the
use of questionnaire that was used for data collection. Copies of questionnaires were
distributed online and in several libraries of the northern suburbs in Victoria. The
sample size was supported by our class teacher (Katrina Naughton), She was of the
opinion that for a population of 100 and above is acceptable. To improve the
Reliability and validity of the research instrument, the questionnaire was pilot-tested
on similar but smaller sample group from neighboring Libraries while I was taking
their survey. Observed errors, corrections and re-wordings discovered were effected
and incorporated into the main survey from the total of 100 and 5 copies of
questionnaire distributed, 98 were filled and returned, representing a response rate of
93.0%.

DATA ORGANISATION
Students should provide evidence of how they have organized the data
in readiness for manipulation.

If qualitative data is collected, there must be evidence of how it is


codified. (Put this evidence in the Appendix)

Criteria Thoroughly and systematically prepares the data for


manipulation by selected software tools including codifying all
qualitative data using appropriate physical techniques or software
tools.

DATA MANIPULATION
Students should provide evidence of the information generated from
their data, manipulated using software appropriate to the types of data.

Criteria Uses an extensive range of digital system components,


software functions, techniques, formats and conventions to manipulate
the selected data to produce insightful information suitable for
interpretation.

DATA VALIDATION
Students must also provide evidence (either in writing or through
annotations) of how the acquired data is assessed for its integrity.

PAGE 4
Criteria

Selects and applies a complete set of validation techniques that result


in a dataset that has full integrity.

FILE MANAGEMENT SECURITY LEGAL REQUIREMENTS


Students should also provide evidence of how their files are managed
this could be presented for example

as a folder map; a listing of files and how these files are secured
and meet any legal requirements.

Criteria

Documents and applies a comprehensive file management plan.


Selects and applies a comprehensive range of physical and
software security controls to protect all stored and communicated
data and information.
Meets all legal requirements.

The evidence from this task is assessed through criteria 2


and 3.

PAGE 5
Project Plan
Finished this project using the following plan schedule that lists the
resources and time to complete the necessary tasks across the 11
periods and hours allocated.

PAGE 6
Appendix 1 - Survey (Primary Data)
This survey was used primarily to get the o
btain the information in
order to prove my hypothesis.

PAGE 7
Appendix 2 Codified Data

PAGE 8
Appendix 3 - Data Set (Secondary)
This page was used as secondary data which agrees on my hypthotesis that bad
sleeping habits do indeed affect grades

PAGE 9
Reference List

All intellectual property must be acknowledged using one of the four


listed methods.

Criteria

Uses a standard referencing system and applies conventions


consistently and appropriately to each data source and acquisition
method. Correctly acknowledges all intellectual property.

PAGE 10

Das könnte Ihnen auch gefallen