Students Name Professor’s Name Course Date

What is APA style?

Is an American Psychological writing style developed in 1929 by social scientist to guide writing.

Writing style for academic documents such as journals, thesis and books.

Consists of different rules and procedures to be observed during writing.

Writers and publishers use uniform elements in writing such as title page, paper citation, body presentation, punctuations and abbreviations, presentation of numbers and statistics and many others.

Writers and publishers can use the style purely or can modify it to achieve given writing standards. The format has been developed over the years to suit the growing needs of scientific writing.

2

What is the need of APA style?

The style was developed due to the need of uniform scientific reporting.

Uniformity and simplicity of the style enables users to be able to read through the documents faster with ease.

It provides clarity in the academic works by preventing language biasness.

The rules enables all facts and ideas to be disclosed without any distraction in the writings.

The style enables writers to follow rules in their work thereby making the writings consistent. Again, the style has a standard language to be used by every scholar or publisher. For this reason, the format enables accuracy in all academic writings.

3

General APA guidelines

The work should be typed and printed on a standardized white paper of 8.5 x 11 inch per paper.

The document should have a 1 inch margin in both sides.

The beginning of all the paragraphs should be indented by pressing Tab once or placing five spaces.(Lester et al. 35).

APA format recommends the use of 12 pt. of Times New Romans font for clarity.

The paper uses single space after periods or punctuation marks in every sentence.

The entire work is finally double spaced for clarity.

The general guidelines are set to ensure that all the work is clear and presentable. This is important as scholars don’t strain to read the information in the paper.

4

Grammar and Language in APA

The style encourages the use of active voice in all the writings (Szuchman et al. 37).

The author should always use bias free language in the writings.

Writers must observe grammatical rules which include;

Avoiding dangling modifiers

Ensuring verbs and subject agreement

Avoid using linguistic devices such as clichés, alliteration and rhyming words.

Use of correct spelling of words.

Avoid being redundant in the writing

The sentences should never begin with numbers.

Arthurs use less abbreviations in their work.

Observation of grammar rules enables the readers to get the actual ideas of the writer. Again, the rules enables scholars not to be confused as a result of usage of inconsistent words.

5

Title page

The title information should have a specific page.

It contains the heading, writers, and the institutional affiliation of the scholar. (Szuchman et al. 159).

It includes the running head flushed to the right with the page number flushed to the right. The format is as shown;

Running head: PAPER TITLE page number

Note that the paper title is in capital case while the running head in in small caps.

All other pages have headings flushed to the right as shown

PAPER TITLE page number

The title page is important in providing the first impression of the work. All the titles in the paper should be in the upper case except the one used in the title page which contains both upper and lower case caps. The main words should begin with upper case while miner words begin with lower case.

6

Title page

The main characters in the title should begin in capital letters while other words begin in small letters. (Szuchman and Lenore 91).

The information should be written in the middle of the page.

The heading should not be more than 12 words in length without any abbreviations.

The authors name is typed below the title starting with the first name, middle name(s) and the last name.

Institution affiliation is typed below the authors name.

All text in the title page should be double spaced.

The author’s name should not contain initials such as Dr., PHD. And others. Besides, the institution affiliation is used to indicate the place or facilities used by the aurthor to conduct the academic research.

7

Abstract

The writing should have an abstract.

The abstract provide an overview of the paper. (Szuchman and Lenore 74)

It should be between 75-100 words .

The abstract should be placed in it’s a different page after the title page.

It should be headed “Abstract” at the center in the upper end of the page.

The abstract should not be indented.

The abstract is used to show how the writer has organized the work. Again, it can be used to provide the main words in the paper.

8

Body

This part is always on a different section of the work.

The heading which is in both upper and lower case should appear at the center of the first line (Swales et al. 53) .

The introduction follows the title.

Headings should be used to organize the work and show important sections.

The author must in text the source documents used in the writing.

Visual figures can be used to illustrate given points.

The body always starts on the third page. In case the author uses visual figures and diagrams, they should be as simple as possible to enable the reader to understand the work.

9

Paper Citation

All the materials used must be cited in the paper (Swales et al. 63).

If the writer directly quotes from a material, citation must include the authors last name, year of publication and page of the book as shown;

“APA style is often difficult to use,”(John, 2014, p. 35), as students confuse it with other styles

Use paragraph numbers to cite online work with no page numbers.

In case of long quotations, omit the quotation marks then write the words indented from the left margin on a different section as illustrated below;

John’s (2014) study concluded that:

Many first year scholars encounter many challenges in APA formatting. However, with good practice, the students find the style very easy to use as compared with others. For this reason, most lectures encourage their learners to always use the style in their work.

Scholars have to cite their work to prevent plagiarism. Furthermore, citation is a way of recognizing and appreciating other scholars work in the academic field.

10

Paper Citation Cont’

When a writer has summarized or paraphrased a given authors work, the writers identity and period of publication is given as shown;

According to John (2014), APA formatting style is difficult for most first year students.

The page paraphrased can also be indicated but not a must.

Lectures always encourage students to use APA format in their writings (John, 2014, p. 35).

In case the material has two authors, “&” is used to include both names as shown;

Kennedy, G. C., & John, P. L. (2007). (Kennedy & John, 2007)

In case of three authors;

Maurice, K. A., Ken, E. L., & Vista, U. N. (2004).

First citation, (Maurice, Ken, & Vista, 2004)

Subsequent citations, (Maurice et al., 2004)

In citing a material published by two authors, always include both names of the writers in every place. However, in case of three authors, only use the three names of the writers in the first citing.

11

Paper Citation Cont’

More than three authors is cited as;

Felix, B. C., Alfred, M., Mali, K., MacCleopas, R. T., & Vista, M. (2004). Becomes, (Felix et al., 2004)

When citing materials from the internet, always use the last date the material was revised by the writer.

In case no authors are included in the work, use the main words of the title instead of the writer.

Use “n.d.” when the work has no date of formatting instead of the date.

For example,

John and Kennedy (2014) give important concepts in APA formatting style.

The APA style is one of the easiest formatting writing styles( APA Style, n. d.).

12

References

Sources used should have a separate page at the end of the work.(Szuchman et al. 84).

The page should be headed “Reference” in the middle of the first line of the paper.

Every cited works must be provided at the reference.

References should be having hanging indentions.

The sources should be given in an alphabetic manner using the last name of the first author.

Any sources apart from journal articles should have upper case in the first letter of a title or a subtitle, first words of proper nouns and letters after colon or a dash in the title.

The references enable the reader to be able to trace the facts in the research done.

13

References Cont’

All the main words in the journal title should be in capital letters (Szuchman et al. 143).

The titles of major materials should appear in italics.

Shorter works such as essays and some journals should not be quoted or italicized.

Arthurs names should start with last names then other initials follow.

In case the authors are more than six, list them then use “et al” after the sixth writer.

14

References Cont’

Single authors; Last name first, followed by author initials. For example;

John, K. (2014)…….

Incase of two authors , the writers names are given then & is used between the names as shown;

Kennedy, S., & Abril, W. I. (2007)…………..

When the authors are an organization,

American Dentist Association. (2007)……

When the paper uses citations with no authors name, a writer should use a shortened title of the work using the main words.

When two or more writings by the same author is given, the scholar should list them following each other according to the year of publication as shown,

John, J. K. (2008)…….

John, J. K. (2010)…….

References where authors have first similar names, the subsequent names should be used to arrange the sources alphabetically. Again, if the sources are from the same author in the same year, they should be organized alphabetically in the order of the article first word of the title.

15

References Cont’

The basic format for referencing books is given by (Szuchman and Lenore 84);

writers last name and initials(Year of publication or editing). Book heading. Place: printer

In case the book has been edited, it should contain the word “ed.” At the end of the title.

Electronic references;

Web page,

Scholars name (Last date of edition). Title of resource. Web address where the information was retrieved.

Online publications,

Author last name(s) and initials (last date of edition). Title of material, Heading of the publication, volume number(edition number). Date of retrieval, web page address

In case a author appears in a source document as a sole author then as a main writer in a group of writers, then the single author entry should be first. Besides, where, the authors name(s) are not there but the editors name are given, the editors last names and initials should be used.

16

Works Cited

Lester, James D., and James D. Lester. Writing research papers: A complete guide. Pearson, 2012.

Swales, John M., and Christine B. Feak. Academic writing for graduate students: Essential tasks and skills. Vol. 1. Ann Arbor, MI: University of Michigan Press, 2004.

Szuchman, Lenore T., and Barbara Thomlison. Writing with style: APA style for social work. Cengage Learning, 2010.

Szuchman, Lenore T. Writing with style: APA style made easy. Cengage Learning, 2013.

Windows Network Proposal - Networking

You have been hired by Fixing Windows LLC as an Information Technology consultant to develop a technology proposal. Fixing Windows LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.

Current Implementation/Concerns:

· The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices.

· Data security is priority since patent and trademarks are at stake.

· Los Angeles sales personnel will need secure remote access to Houston office.

· The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place.

· Feel free to make other assumptions but they need to be noted in the paper.

Topics to Cover:

Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2016 operating system should be used for all aspects of the solution.

The topics include:

DNS and DHCP

· How had DHCP installation and authorization been implemented?

· DHCP scope design (e.g., lease times, number of scopes, address range)

· Will a form of DHCP fault tolerance be implemented?

· Will DHCP reservations be used for servers?

· How can IPAM be utilized?

· How will IPv6 be utilized?

· How will DNS be implemented?

· DNS Security

· How will DNS be handled for the second and third site?

· What namespace should Fixing Windows LLC implement?

· What types of zones needed?

File Services, DISTRIBUTED FILE SYSTEM (DFS) AND BRANCHCACHE:

· How will the shares be secured?

· Will quotas be used? FSRM be configured?

· Will DFS be implemented?

Remote Services and NETWORK POLICY SERVER (NPS):

· What technology will be implemented to provide secure remote access for users?

· Who should have remote access?

Discuss these other server 2016 Networking concepts:

· HIGH PERFORMANCE NETWORK SOLUTIONS

· SOFTWARE-DEFINED NETWORKING (SDN)

Submission Requirements:

There are specific requirements for the assignment: The final submission should contain at least 6 pages’ worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages’ worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

· At least one diagram must be included (not counted towards the minimum length described above). You can have more.

· The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed.

· The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

· At least one non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

· Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

Running Head: WINDOWS NETWORK PROPOSAL

WINDOWS NETWORK PROPOSAL 11

Windows Network Proposal - Networking

Ademola Adebisi

Serhiy Kuzhanov

CMIT 370

03/01/19

Introduction

Fixing Windows LLC is taking steps towards having a technology solution capable of effectively supporting its growing operations. Windows Server 2016 is only succeeded by one generation of the server releases, placing it as a modern solution for organizations that choose to embrace it, and provides solutions that meet the needs of the company. Fixing Windows LLC doesn’t have to worry about implementing different solutions for its different offices, with this solution capable of being effectively deployed to serve these multiple locations.

Active Directory

At both the Dallas and Houston offices will be an active directory forest, and each of them will contain the domain, application, and group policy and configuration data and will operate independently of each other as users will not be capable of accessing the other forest. Each of the active directory forests will consist of domain controllers that will be constantly exchanging files among each other. To determine the extensibility of the system, tasks like data replication will happen within these active directory forests. There will be around six or so domain controllers in an active directory forest and these will be responsible for supporting administrative activities for Fixing Windows LLC. Comment by Serhiy Kuzhanov: This is against every Microsoft best practice Comment by Serhiy Kuzhanov: What files do domain controllers need to exchange and why?

The main domain controller of the company will be located at the Houston offices, with Dallas also being capable of hosting the controller. However, for redundancy purposes, there will also be a read-only domain controller that will be installed at the Los Angeles offices, with backup solutions. As a read-only setup, the Los Angeles domain controller will not be likely to threaten the security of the man controller in Houston. The Los Angeles office will be a sales office, with a small staff and as such will need minimal technical support compared to the Dallas and Houston offices. These offices, given their relatively large sizes in terms of personnel and operations, will be from where the active directory will be managed. With different departments and the employees conducting different roles and responsibilities within the organization, organizational units will be established, with each unit for each of the various departments, and each of them operating independently. User profiles along with their permissions, system privileges and access controls will be managed within these organizational units, ensuring that each of the units is responsible for setting up the credentials for users under them and that the access controls granted to the user are within the limits of the user’s duties. For tracking and auditing purposes, there will be the flexible single master on (FSMO) roles that will be installed on a small number of stations, with the roles ending up on domain controllers from where other stations will access to get a given role (Palmer, 2017).  Comment by Serhiy Kuzhanov: If you have two forests, how can you have one mail domain controller? You will at least have two main domain controllers – one for each forest. And how can you say that Dallas is capable of hosting a domain controller if you already said that you will deploy an independent forest at that site, so it MUST include a domain controller

Group Policy

The system administrators of Fixing Windows LLC will use Group Policy to establish user and machine configurations, with settings like determining the limit of user’s failed login attempts before they are locked out of the system, to the deployment of applications. The Group Policy settings are applicable to all levels within the active directory, including the domain, organizational unit, to a site computer. The policy settings can be edited and managed through the Microsoft Management Console or through the PowerShell. The Group Policy Object Editor is responsible for managing the various group policies and is located under the management console and the administrator has the option of browsing the various policies and subsequently making a selection. PowerShell could also be used to make edits to group policies, with a module dedicated solely to the management of group policies, which will however only be available at the Houston office which has been configured as the domain controller (Palmer, 2017).

Group Policy allows for application deployment either through publishing or assigning. Deployment through assigning happens when the particular application can be accessed by users and other workstations. From any of the company’s workstation, the employees of Fixing Windows LLC will be capable of accessing any application that had been deployed by way of assigning. It is a cheap way of deploying applications and will ensure that employees have easy access to basic and essential applications they require to complete their responsibilities. When an application has been deployed via publishing, then the application will only be available to the users, where instead of it being installed within the computer, will be tied to a particular user. Whenever a user needs to access the application, they will log onto any computer and will then be prompted to install the application, which will then be uninstalled when they log off. It is a useful solution when there is a need to restrict the access to certain applications to specific users within the organization. Publishing will then become a part of the company’s data security efforts as it will place restrictions on access to sensitive applications and the data that come with them. The company has a number of trade secrets that it would prefer to be restricted to a few authorized individuals within the organization. Providing access to these applications via assigning would expose them to the risk of being accessed by unauthorized individuals, making publishing the most appropriate solution to maintain confidentiality (Krause, 2016).

Information security is important for any organization, and Fixing Windows LLC has been provided with Windows Firewall with Advanced Security, which is deployable under Group Policy settings. It is a capable tool that can be utilized to screen all traffic moving in and out of the system for potential threats. From the group policy settings, the administrator can also undertake user access control and determine the privileges that various users will be granted within the system. It should prevent unauthorized attempts to access or manipulate data in the system without the express authorization to do so, with any user that seeks such access needing to have been granted the right credentials (Krause, 2016).

DNS

DNS will be used to provide name resolution through the provision of temporary IP addresses to the TCP/IP and to DHCP for the provision of temporary IP addresses to client computers. The activities of DNS will be supported by three servers, with other backup servers that will be deployed to act as failover options in the event that the primary servers are down. The servers will be housed at both the Houston and Dallas offices with a DNS server at each of the offices. The servers will be installed and configured at these offices manually, ensuring there is a direct interaction between the technical team and the server for purposes of making any identification of potential issues with the servers and addressing them as soon as possible. The main server will be responsible for managing the addresses, hosting most of them, with any other addresses being hosted within the backup server. The main server will be the location from which clients will be provided with their IP addresses, with this continuing until such a point that the backup server will need to take over should the primary server experience failure. The backup server has been envisioned as the principal backup solution for the main server, containing similar data and capabilities and could hence easily take over for the main server in the event of failure (Thomas, 2017). Comment by Serhiy Kuzhanov: That is a function of DHCP

As the company seeks or more ways to remain up to date with emerging technology, it will be taking steps towards the use of mobile devices within the organization, which should mobility and allow for employees to access company technology resources even when away from the office. With mobile devices, it can happen much more efficiently, with the devices being highly portable while at the same time possessing capabilities for sophisticated functionalities. These devices will make use of two virtual servers deployed to utilize split DNS, with a much more simplified approach for the DNS namespace design (Palmer, 2017).

File Services

A file system will be installed within its own independent server and will be assigned a unique IP address. Users, on the other hand, will be provided with virtual drives they will use for individual tasks with shared drives deployed for hosting network files. The file server resource manager (FSRM) will be used to administer both the user and the shared drives, with a number of actions taken to ensure the efficient use of the available resources. Individual users will be allocated a limited space size within the drives assigned to them while the different departments given their varying needs will be allocated the space on a case by case basis to ensure each department to have the optimal space allocation for its operations. The same way, should any user or department require additional space, they will place requests for the same and further allocations will also happen on a case by case basis. However, the quota system will be strictly maintained, with an additional request for space needing to be done only at the utmost necessity, with users being more careful with the way they use up the space allocated to them. The administrator will, therefore, be responsible for both setting up and enforcing rules on effective space management within the system, making extensive use of the capabilities provided by the file server resource manager (FSRM). The File Classification Infrastructure (FCI) is a tool within the FSRM that can classify various file formats and subsequently used to restrict certain formats from being stored within the various allocated spaces, whether within individual user drives or the shared drives. As such, users will be prevented from storing certain files types within their drives to ensure they do not use up their allotted space for non-essential storage. The administrator will be alerted whenever a given user or department is close to depleting their allotted space. It should give the administrator to decide on how to handle the situation, which could include analyzing the user space for potential optimization leading to more space being freed up or seeking ways to provide the additional space. FCI could also be used to place encryption on certain files to restrict access to them as well as place expiry dates on other files and ensure they are deleted within a certain period of time. The latter could be a response to dealing with certain file types that are no longer of use to the organization and their effective disposal will lead to the availability of more space to be allocated to users and departments (Thomas, 2017).

With Distributed File Services (DFS) are DFS Replication and DFS Namespaces, providing the availability of a common directory to users. With DFS Replication, there is the capability to conduct folder replication across multiple sites and multiple servers, and do with efficiency. To make effective use of the available space, file compression algorithms are used on files, leaving more space available for further utilization in future. An effective compression method used will be the remote differential compression which instead of making replications of an entire file, will instead seek out the modification that was made to it and retain those modifications. Such an approach should avoid unnecessary redundancies and lead to appropriate use of space. DFS Namespaces provide an administrator with a virtual view of shared folders that have hosted within different servers and consists of a single root that has multiple other targets and links. Multiple root targets can be mapped from a single root, and users are able to view a namespace as a single folder containing multiple subfolders within it. It is a quite effective solution for when data is spread out across multiple servers, making tedious for users to access the different servers individually to access the data. Instead, users get a streamlined solution where all these servers can be viewed as a single folder known as the namespace and allowing for easier conducting of tasks by viewing multiple folders from different servers from a single location (Palmer, 2017).

Remote Services

The remote server access role can be implemented with three role services namely Direct Access, Web Application Proxy and Routing and Remote Access. Remote access provides centralized administration and the monitoring and tracking of Direct Access and Routing and Remote Access Service, which can be deployed on one Edge server. The management of these technologies can be conducted via both Remote Access Microsoft Management Console as well as on the Windows PowerShell. Direct Access provides users with remote access capabilities to applications as well as other shared resources that are located within a restricted internal network, providing such access without the user having to resort to a virtual private network (VPN). Direct Access will launch a connection with another within the network that has been enabled for Direct Access and establishes a two-way connection via the internet, doing away with the need of the remote users to first access the company’s internal network. The system administrator will have their capabilities and reach expanded as they will be able to conduct remote administration tasks without necessarily having to use a virtual private network to achieve that (Krause, 2016). 

With an office located thousands of miles away in Los Angeles from the Texas offices, the employees in Los Angeles should easily access the resources within the Houston and even the Dallas offices. This will, however, require that there be a reliable WAN internet connect since the Direct Access remote capabilities will require reliable internet service to successful establish remote access. The system administrators will also benefit, allow for seamless connection to all of the company’ technology resources via an efficient solution (Thomas, 2017). 

Windows Server Update Service (WSUS)

The Windows Server Update Service (WSUS) streamlines the capabilities of the administrators to conduct management and distribution of updates to the system via the central management console. Known as an update source, the server responsible will be connected to Microsoft Update, from where it will be getting regular information on available and upcoming updates. The administrator will have the choice of making further additions to the servers in a bid to improve their capabilities. With Windows Server Update Service, Fixing Windows LLC will have streamlined the update management tasks for the whole system by having them done from a centralized console, allowing for a comprehensive view of the system. An automated solution will ensure updates still happen even if the administrators forget to make themselves. The Windows PowerShell enhanced capabilities will extend to the management of The Windows Server Update Service (WSUS) (Krause, 2016).

Summary

The Windows Server 2016 was released with many more features, some new and some Justas they were in the previous iteration as well as many improvements. Fixing Windows LLC has thus being provided with the requisite tools and capabilities that will allow it to continue growing its operations with the right technological tools.

Appendix

Direct Access communication between two sites

C:\Users\Bones\Documents\Mark\Phone\msc\DirectAccess_Wide_Area_Deployment.png

References

Krause, J. (2016). Mastering Windows Server 2016. Packt Publishing Ltd.

Palmer, M. (2017). Hands-On Microsoft Windows Server 2016. Cengage Learning.

Thomas, O. (2017). Windows Server 2016 Inside Out (includes Current Book Service). Microsoft Press.


Meaning of Problem Statement in a Research

A problem statement refers to clear description of issues(s) such as the vision, issues statement as well as approach that is needed to solve a particular problem (Bryman, 2008).

A problem statement is used to help an individual or a team to remain focus on research efforts so as to solve a given problem. A problem statement should be designed to address the following questions:

*

Cont’

What is the problem? - In this sense the focus is on boundaries of the problem such as customers or work flow among others

Who has the problem? – Focuses on the person or group that is affected by the problem. For instance, it can be customers or particular groups among others.

Why- Relates to the reasons that indicate the importance of solving a particular problem?

*

Cont’

When- Relates to particular time when the problem occurs.

Where- Relates to specific area that is affected with the problem such as certain places or process among others.

*

Cont’

The purpose for writing problem statement is as follows:

Introduce the significance of studying particular topic or issues to readers

Put the problem is a given context to make it easy for carry out study on it

Gives information concerning the tools that will be needed to display required information.

*

Description of a Background

The main issue in the background of the problem is the ability to reflect on facts related to problem so that other readers can understand the problem well.

Background description enables researchers to have better understanding on how to design the experiment (Schindler & Cooper, 2014).

In order to have a good description of background information the researcher needs to consider answering the5W’s.

*

General information in a Background Search

Wide view of the subject of study (root of the problem)

Definition of the topic

Major dates as well as events in the study

The key words and specific concepts concerning the study.

*


Problem Description and Research objective

Description of the problem includes particular important points such as the hypothesis concerning the research, main treatments, and explanation of the location and scope of the study. Problem description should be done on specific terms other than general terms.

Research objectives are the descriptions what researchers expect to achieve at the end of the study (David, 2011). The objectives in this case are determined through looking at the kind of research that needs be done as well as information that should be obtained by the study. The kind of questions and subjects of study are the important factors for determining the research objective

*

Examples on How Samples can be used

Samples are used when collecting data to represent the entire population. For instance, collecting sample data through observing a particular group of people so as to help in making inferences concerning the general population.

Some of the information such as individual opinions can be obtained through sampling (opinions of college students) to give a bigger picture concerning the popularity of particular political candidate among the youths among others.

*

Definition of Limitations of Research and Example

Research limitations refers to shortcomings or influences that put restriction to the methodology and conclusion of a research yet the researcher has no control over such issues (David, 2011).

Some of the areas that can be used to identity limitations include the analysis, choice of date collection methods, nature of self-reporting, nature of the samples (scope) used in the experiment as well as the time limit.

An example of a research limitation is on a study that is done in a particular city involving men is subjected to limitations such as gender, sample size as well as the location.

*

Example of Diagram and Chart

The percentage of new students who joins different sports in their school each year

Example of number of cars sold within particular period

*

Chart1

Football
Rubgy
Tennis
Others
Sales
0.4
0.2
0.25
0.15

Sheet1

Sales
Football 40%
Rubgy 20%
Tennis 25%
Others 15%
To resize chart data range, drag lower right corner of range.

Chart1

week 1 week 1 week 1
week 2 week 2 week 2
week 3 week 3 week 3
week 4 week 4 week 4
Nissan
Toyota
others
0
7
8
3
10
5
7
7
4
4
3
4

Sheet1

Nissan Toyota others
week 1 1o 7 8
week 2 3 10 5
week 3 7 7 4
week 4 4 3 4
To resize chart data range, drag lower right corner of range.

Conclusion

Most of the research studies have gaps which need to be foundation for conducting other studies in the future.

When mentioning limitations the researcher should state the choices

*

Recommendations

Every researcher should strive to reduce the scope of limitations during the study.

Every researcher should follow all the necessary steps when doing a research in order to have a comprehensive research study.

*

References

Bryman, A. (2008). Social research methods, 4th edition. Oxford: Oxford University Press

Schindler, P., & Cooper, D. (2014). Business research Methods. New York: McGraw-Hill.

David, S.(2011). Qualitative research: Issues of Theory, method and practice, 3rd edition. New Delhi: Sage Publications.

*

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com