What is discourse analysis

Assignment Help Basic Computer Science
Reference no: EM132988849

1. What is discourse analysis? Give an example of how this could be used in a research study.

For example, using discourse analysis to study the social interaction of Pokemon Go users. One could collect conversations of user discussing community event days to understand what motivates them to join in on those days.

2. What is data collection? What types of qualitative data do you think you could collect and why?

3. What is the purpose of coding your data? Select one type of coding strategy mentioned in this week's materials and describe how it can be used in a (or your) research study.

Reference no: EM132988849

Questions Cloud

What is the future value : What is the future value in 27 years of an ordinary annuity cash flow of $704 every quarter of a year at the end of the period
Compute the number of shares repurchased : Compute the number of shares repurchased from you and the total cash flow you will receive under the new capital structure
What is the present value of growth opportunities : Phoenix Industries has pulled off a miraculous recovery. Four years ago it was near bankruptcy. What is the present value of growth opportunities (PVGO)
How much overhead is assigned to product : Y Company estimated that it total overhead cost of $600,000. How much overhead is assigned to Product 1 using traditional costing
What is discourse analysis : What is discourse analysis? Give an example of how this could be used in a research study.
Calculate the direct-material price and quantity variances : Calculate the direct-material price and quantity variances and the direct-labor rate and efficiency variances. Indicate whether each variance is favorable
What is the balance in an account : What is the balance in an account after 10 years if $2,500 is deposited today, earning 4% interest compounded annually? Compounded quarterly
Describe the three products of accounting : Describe the three products of accounting and bookkeeping procedures that are most useful in personal financial planning
What are the purposes and uses of assets : What are the purposes and uses of assets? What financial factors should you consider when deciding to borrow capital

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find a minimum-weight spanning tree of the graph

Use the GraphW Workshop applet to find the minimum spanning tree of the graph shown in Figure 14.6, "Train fares in Magnaguena." Consider the graph to be undirected; that is, ignore the arrows.

  Security policy mission statement for dayton soft products

Create an approximate 90-word security policy mission statement for Dayton Soft Products.

  Define what is meant by outsourcing

Define what is meant by outsourcing. Summarize the outsourcing risks concerning control, long-term costs, and exit strategy.

  Differentiate public key and a private key cryptosystem

Explain why using shift ciphers is a private key system.

  Same system in australia

A gaming system is priced at $395 CAN and the same system in Australia is priced at $505 AUD. In Australian dollars, which would be the better deal if $1 CAN = $1.09 AUD? By how much, in Australian dollars?

  Discuss the main advantage of such a scheme

An extreme method of spooling, known as staging a tape, is to read the entire contents of a magnetic tape onto disk before using it. Discuss the main advantage of such a scheme

  Write a program that asks the user to enter two integers

(Comparing Integers) Write a program that asks the user to enter two integers, obtains the numbers from the user, then prints the larger number followed.

  Apply datadesign architectural design component level design

Apply the data design, architectural design, component level design, and user-interface design activities to the AutoPark project.

  Cyber security and risk management

Read Four academically reviewed articles on Cyber Security and Risk Management. discuss the relationship between cyber security and risk management.

  Security procedures

When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?

  Artificial Intelligence for health

As word of the 3HS commitment to technology spreads among the staff and in the communities served. Artificial Intelligence for health,

  High dimensionality of big data

MIT Professor Andrew Lo mentions that it is the high dimensionality of Big Data which makes his machine learning algorithms so potent

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd