Genders Male [ ] Female [ ] 2. Age 12-15 [ ] 16-19 [ ] 20-23 [ ] Above 23 years 3. Residence Rural [ ] Urban [ ] 4. Highest level of education attained Elementary [ ] Primary school [ ] High school [ ] College [ ] University 5. Do you have access to internet services? Yes [ ] No [ ] 6. How often do you use the Internet? Daily [ ] More than once a week [ ] Once a week [ ] Once a month [ ] Rarely [ ] 7. How many hours is your session on the internet each time you visit the internet? 0-1 [ ] 1-2 [ ] 2-3 [ ] 3-5 [ ] More than five hours [ ] 8. What sites do you normally visit? Games [ ] Facebook [ ] You tube [ ] Online Library [ ] Twitter [ ] Any other (specify)………… 9. Which device do you use to access the internet? Desk top computer [ ] Laptop [ ] Mobile Phones [ ] Ipads [ ] Any other (specify) ………………. 10. What activity or activities do you do on the internet? Research [ ] Sending Emails [ ] Blogs [ ] Chatting [ ] Shopping [ ] (Any other specify) …………. 11. Where do you use internet most? Home [ ] College [ ] Office [ ] Cyber Cafe [ ] Any other place (specify)................. 12. What the main means of communication with friends? Voice calls [ ] Video Call [ ] Email Messages [ ] SMS [ ] Voice over IP [ ] Any other (Specify) ……. 13. Have you ever met the people with whom you communicate? Yes [ ] No [ ] 14. How easy is it to meet the people with whom you exchange information? Very easy [ ] Easy [ ] Possibly [ ] Rarely [ ] Not possible [ ] 15. Which method of Communication enhances meeting of the online contact? Video call [ ] Voice call [ ] VoIP [ ] SMS [ ] Any other (specify) …………… 16. Have you ever received training on the use of internet? Yes [ ] No [ ] 17. Is training on internet use beneficial? Very beneficial [ ] Beneficial [ ] Slightly Beneficial [ ] Not at all [ ] 18. Have you faced any issue with internet security? Never [ ] Sometimes [ ] Frequently [ ] 19. How do you secure your information? Creating strong password [ ] Blocking the intruder [ ] Any other way (specify) ………… 20. Do you have a personal website? Yes [ ] No [ ] Analysis The questionnaire was administered to ten individuals who had different answers to the questions and the analysis of the answers was done to inform the prevalence of the usage of internet and other issues. The individuals who responded to the questionnaire include the following; Toyosi Abass, Lamia Abdullhosin, Sara Abdulreda, Ruba Ahmed, Huseyin Aksu, Abdullah Al-Obaidi, Jack Alexander, Muna Ali, Samira Ali and Zakir Almo. These individual had different answers according to their exposure to the different things that are according to the internet usage in the different places in the world. In response to the question whether they had access to internet, all the people said that they could access it through the different gadgets which they had or they could access from other people. This implies that all of them could be able to use internet if they chose to use it because it was usually at their disposal and therefore, none had any excuse in relation to their failure to use the internet to access information through it. When asked about the frequency of usage of internet, the different respondents had different answers to give towards the question with, Toyosi Abass, Jack Alexander, Zakir Almo and Sara Abdulreda saying that they used it daily. Lamia Abdullhosin,
Cite this document
(“Develop a questionnaire and analyse the data Essay”, n.d.)
Retrieved from https://studentshare.net/sociology/101710-develop-a-questionnaire-and-analyse-the-data
(Develop a Questionnaire and Analyse the Data Essay)
“Develop a Questionnaire and Analyse the Data Essay”, n.d. https://studentshare.net/sociology/101710-develop-a-questionnaire-and-analyse-the-data.
Cited: 0 times
Approaches to Research in Social Sciences Institution Professor Date In order to establish the level of usage of internet in different places among the young men in the society, a sample of youth was taken from a group of students who represented different factors of the research…
The objective of this paper aims at integrating varied methods of analyses and findings in order to get a true picture of the meaning of the given outcomes and their results. The entire analysis has been done to take care of issues that have the potential to impact and lead towards quality management practices.
In the recent times the banks have displayed a wide variety of problem regarding service to the customers due to which the customer has lost confidence over the banks. The general public are now seen to have low level of trust and reputation on the banks.
r procedural test, reliability is the extent to which the measure used produces similar results after repeated trials (Lyberg, Biemer, Collins, Leeuw, Dippo, Schwarz, and Trewin, 1997). Research will never be fully reliable but the extent to which individual results remain similar over time signal the reliability of information.
Therefore, there has been a significant increase of 17,802 visitors during the interim period of 98 days, meaning an average page view per day of 181 which is significantly lower than in previous periods.
Daily Visitors: Although
nd restaurants so that the franchise branch of brand Black Angus Steakhouse can be smoothly run and developed, where the needs and demands of the customers can be presented in a stylish and innovative way. As the study is related to hotel, the regular visitors of hotels and
It is evident from the above calculations that the average monthly cash flows for Madea remain below £400 throughout the year, therefore it is not possible for her to finance her bicycle in these circumstances even if the bicycle costs her the
The interviews revealed that most of the respondents are aware that once they have uploaded their data to the social media sites, they no longer own that data as it is in the public domain or is held in the platforms servers. There are also
SQL injection is a class of vulnerability that poses extremely high risks in the present threat landscape. The MITRE Common Weakness Enumeration (CWE) ranked SQL injection as first in the list of top 25 most dangerous software errors. Many high-profile intrusions have demonstrated the exploitation of these vulnerabilities.
5 pages (1250 words)Research Paper
Got a tricky question? Receive an answer from students like you!Try us!
Let us find you another Essay on topic Develop a questionnaire and analyse the data for FREE!