Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

UC6- Present relevant information DRiving.docx

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
CBLM In
Practice
Present
Relevant
Information
Date Prepared:
September
2022
Document No:
Page 1 of 44
Issued By:
PTC-DN
Pr...
CBLM In
Practice
Present
Relevant
Information
Date Prepared:
September
2022
Document No:
Page 2 of 44
Issued By:
PTC-DN
Pr...
CBLM In
Practice
Present
Relevant
Information
Date Prepared:
September
2022
Document No:
Page 3 of 44
Issued By:
PTC-DN
Pr...
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige

Hier ansehen

1 von 47 Anzeige

Weitere Verwandte Inhalte

Ähnlich wie UC6- Present relevant information DRiving.docx (20)

Anzeige

UC6- Present relevant information DRiving.docx

  1. 1. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 1 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 COMPETENCY BASED LEARNING MATERIAL Sector: AUTOMOTIVE AND LAND TRANSPORT(21ST CENTURY) Qualification: DRIVING NCII Unit of Competency: PRESENT RELEVANT INFORMATION Module Title: PRESENTING RELEVANT INFORMATION CC
  2. 2. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 2 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 TABLE OF CONTENT  Front Page 1  Table of Contents 2  How to use this Competency Based – Learning Material 3  List Competencies 4-5  Module Content 6  Learning Outcome Summary 1 7  Learning Outcome Summary 2 8  Learning Outcome Summary 3 9  Learning Experiences Learning Outcome 1 10  Learning Experiences Learning Outcome 2 11  Learning Experiences Learning Outcome 3 12  Information Sheet 6.1.1 13-14  Self – Check 6.1.1 15  Answer key 6.1.1 16  Information Sheet 6.1.1a 17-19  Self – Check 6.1.1 a 20  Answer key 6.1.1a 21  Information Sheet 6.2.1 22-27  Self – Check 6.2.1 28  Answer key 6.2.1 29  Information Sheet 6.3.1 30-32  Self – Check 6.3.1 33  Answer key 6.3-1 44
  3. 3. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 3 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL Welcome to the module in Presenting Relevant Information. This module contains training materials and activities for you to complete. You are required to go through a series of learning activities in order to complete each learning outcome of the module. In each learning outcome are Information Sheets, Self-Checks, Operation Sheets and Job Sheet. Follow these activities on your own. If you have questions, don’t hesitate to ask your trainer for assistance. The goal of this course is the development of practical skills. To gain these skills, you must learn basic components and terminology. For the most part, you’ll get this information from the Information Sheets. This module was prepared to help you achieve the required competency, in “Present Relevant Information”. This will be the source of information for you to acquire knowledge and skills in this particular competency independently and at your own pace, with minimum supervision or help from your instructor. Remember to: Work through all the information and complete the activities in each section. Read information sheets and complete the self-check. Suggested references are included to supplement the materials provided in this module. Most probably your trainer will also be your supervisor or manager. He/she is there to support you and show you the correct way to do things. You will be given plenty of opportunity to ask questions and practice on the job. Make sure you practice your new skills during regular work shifts. This way you will improve both your speed and memory and also your confidence. Use Self-Checks, Operation Sheets or Job Sheets at the end of each section to test your own progress. When you feel confident that you have had sufficient practice, ask your trainer to evaluate you. The results of your assessment will be recorded in your Progress Chart and Achievement Chart.
  4. 4. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 4 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 List of Competencies No. Unit of Competency Module Title Code 1 Participate in workplace communication Providing housekeeping services to guest 2 Work in a team environment Working in a team environment 3 Solve/address general workplace problems Solving/addressing general workplace problems 4 Develop career and life decisions Developing career and life decisions 5 Contribute to workplace innovation Contributing to workplace innovation 6 Present relevant information Presenting relevant information 7 Practice occupational safetyand health policiesand procedures Practicing occupational safety and health policies and procedures 8 Exercise efficient and effective sustainable practices in the workplace Exercising efficientand effective sustainable practices in the workplace 9 Practice Entrepreneurial skills in the workplace.
  5. 5. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 5 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 MODULE CONTENT UNIT OF COMPETENCY : Present Relevant Information MODULE TITLE : Presenting Relevant Information UNIT DESCRIPTOR : This unit of covers the knowledge, skills and attitudes required to presentdata/information appropriately. NOMINAL DURATION : 4 hours LEARNING OUTCOMES: At the end of this module the students/ trainees will be able to: LO I: Gather data information LO 2: Assess gathered data/information LO 3: Record and present information ASSESSMENT CRITERIA: LO 1 Evidence, facts and information are collected Evaluation, terms of reference and conditions are reviewed to determine whether data/information falls within project scope LO 2 Validity of data/ information is assessed Analysis techniques are applied to assess data/ information. Trends and anomalies are identified Data analysis techniques and procedures are documented Recommendation s are made on areas of possible improvement. LO 3 Studied data/information are recorded. Recommendation s are analyzed for action to ensure they are compatible with the project’s scope and terms of reference. Interim and final reports are analyzed and outcomes are compared to the criteria established at the outset. Findings are presented to stakeholders.
  6. 6. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 6 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 LEARNING OUTCOME SUMMARY LEARNING OUTCOME # 1 Gather data/information CONTENTS:  Confidentiality  Accuracy ASSESSMENT CRITERIA:  Evidence, facts and information are collected  Evaluation, terms of reference and conditions are reviewed to determine whether data/information falls within project scope CONDITIONS: Student/ trainee must be provided with the following: 1. WORKPLACE LOCATION 2. EQUIPMENT 3. TOOLS 4. MATERIALS  Writing materials  References  Handouts Assessment methods:  Written Test  Interview  Portfolio
  7. 7. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 7 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 LEARNING OUTCOME SUMMARY LEARNING OUTCOME # 2 Assess gathered data/information CONTENTS:  Data Analysis techniques/procedures ASSESSMENT CRITERIA:  Validity of data/ information is assessed  Analysis techniques are applied to assess data/ information.  Trends and anomalies are identified  Data analysis techniques and procedures are documented  Recommendation s are made on areas of possible improvement. CONDITIONS: Student/ trainee must be provided with the following: 1. WORKPLACE LOCATION 2. EQUIPMENT 3. TOOLS 4. MATERIALS  Writing materials  References  Handouts
  8. 8. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 8 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Assessment methods:  Written Test  Interview  Portfolio
  9. 9. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 9 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 LEARNING OUTCOME SUMMARY LEARNING OUTCOME # 3 Record and present information CONTENTS:  Reporting requirements to a range of audience ASSESSMENT CRITERIA:  Studied data/information are recorded.  Recommendation s are analyzed for action to ensure they arecompatible with the project’s scope and terms of reference.  Interim and final reports are analyzed and outcomes are compared tothe criteria established at the outset.  Findings are presented to stakeholders. CONDITIONS: Student/ trainee must be provided with the following: 1. WORKPLACE LOCATION 2. EQUIPMENT 3. TOOLS 4. MATERIALS  Writing materials  References  Handouts
  10. 10. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 10 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Assessment methods:  Written Test  Interview  Portfolio
  11. 11. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 11 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 LEARNING EXPERIENCES LO1 Gather data/information Learning Activities Special Instructions 1. Read Information Sheet # 6.1.1 Confidentiality After reading the information sheet you are required to answer the self-check # 6. 1.1. 2. Answer Self Check # 6.1.1 Compare answers with the answer key to be given to you by your facilitator. If you got a perfect score, continue reading on the next information sheet. If not, review by reading Information sheet # 6.1.1 and try to answer the self- check again. 1. Read Information Sheet # 6.1.1a Accuracy After reading the information sheet you are required to answer the self-check # 6. 1.1a. 2. Answer Self Check # 6.1.1a Compare answers with the answer keyto be given to you by your facilitator. If you got a perfect score, continue reading on the next information sheet. If not, review by reading Information sheet # 6.1.1a and try to answer the self-check again.
  12. 12. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 12 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 LEARNING EXPERIENCES LO2 Assess gathered data/information Learning Activities Special Instructions 1. Read Information Sheet # 6.2.1Data Analysis techniques/procedures After reading the information sheet you are required to answer the self-check # 6. 2.1. 2. Answer Self Check # 6.2.1 Compare answers with the answer key to be given to you by your facilitator. If you got a perfect score, continue reading on the next information sheet. If not, review by reading Information sheet # 6.2.1 and try to answer the self- check again.
  13. 13. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 13 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 LEARNING EXPERIENCES LO3 Record and present information Learning Activities Special Instructions 1. Read Information Sheet # 6.3.1Reporting requirements to a range of audiences After reading the information sheet you are required to answer the self-check # 6. 3.1. 2. Answer Self Check # 6.3.1 Compare answers with the answer key to be given to you by your facilitator. If you got a perfect score, continue reading on the next information sheet. If not, review by reading Information sheet # 6.3.1 and try to answer the self- check again.
  14. 14. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 14 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 INFORMATION SHEET 6.1.1 Confidentiality Learning Objective: After reading this information sheet, you must be able to understand Confidentiality in gathering data. Introduction: Confidentiality refers to the researcher's agreement to handle, store, and share research data to ensure that information obtained from and about research participants is not improperly divulged. Individuals may only be willing to share information for research purposes with an understanding that the information will remain protected from disclosure outside of the research setting or to unauthorized persons. Data confidentiality is about protecting data against unintentional, unlawful, or unauthorized access, disclosure, or theft. Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it. Information with low confidentiality concerns may be considered "public" or otherwise not threatening if exposed beyond its intended audience. Information with high confidentiality concerns is considered secret and must be kept confidential to prevent identity theft, compromise of accounts and systems, legal or reputational damage, and othersevere consequences. When managing data confidentiality, follow these guidelines:  Encrypt sensitive files. Encryption is a process that renders data unreadable to anyone except those who have the appropriate password or key. By encrypting sensitive files (by using file passwords, for example), you can protect them from being read orused by those who are not entitled to do either.
  15. 15. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 15 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00  Manage data access. Controlling confidentiality is, in large part, about controlling who has access to data. Ensuring that access is only authorized and granted to those who have a "need to know" goes a long way in limiting unnecessary exposure. Users should also authenticate their access with strong passwords and, where practical, two-factor authentication. Periodically review access lists and promptly revoke access when it is no longer necessary.  Physically secure devices and paper documents.  Controlling access to data includes controlling access of all kinds, both digital and physical. Protect devices and paper documents from misuse ortheft by storing them in locked areas. Never leave devices or sensitive documents unattented in public locations.  Securely dispose of data, devices, and paper records. When data is no longer necessary for University-related purposes, it mustbe disposed of appropriately.  Sensitive data, such as Social Security numbers, must be securelyerased to ensure that it cannot be recovered and misused.  Devices that were used for University-related purposes or that were otherwise used to store sensitive information should be destroyed orsecurely erased to ensure that their previous contents cannot be recovered and misused.  Paper documents containing sensitive information should be shreddedrather than dumped into trash or recycling bins.  Manage data acquisition. When collecting sensitive data, be conscious of how much data is actuallyneeded and carefully consider privacy and confidentiality in the acquisition process. Avoid acquiring sensitive data unless absolutely necessary; one of the best ways to reduce confidentiality risk is to reduce theamount of sensitive data being collected in the first place.
  16. 16. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 16 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00  Manage data utilization. Confidentiality risk can be further reduced by using sensitive data only as approved and as necessary. Misusing sensitive data violates the privacy andconfidentiality of that data and of the individuals or groups the data represents.  Manage devices. Computer management is a broad topic that includes many essential securitypractices. By protecting devices, you can also protect the data they contain. Follow basic cybersecurity hygiene by using anti-virus software,routinely patching software, whitelisting applications, using device passcodes, suspending inactive sessions, enabling firewalls, andusing whole-disk encryption.
  17. 17. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 17 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Self-check 6.1.1 Direction: Answer the following questions. Write your answer on a separatesheet. What are the guidelines to follow when managing data confidentiality? 1. 2. 3. 4. 5. 6.
  18. 18. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 18 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Answer key 6.1.1 1. Encrypt sensitive files 2. Manage data access 3. Physically secure devices and paper documents 4. Securely dispose of data, devices, and paper records 5. Manage data acquisition. 6. Manage data utilization 7. Manage devices.
  19. 19. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 19 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 INFORMATION SHEET 6.1.1a Accuracy Learning Objective: After reading this information sheet, you must be able to understand how important accuracy is in data analysis Introduction: Accuracy is to be ensuring that the information is correct and without any mistake. Information accuracy is important because may the life of people depend in it like the medical information at the hospitals, so the information must be accurate. The quality of information measured by accuracy, timeliness, completeness, relevance and if it is easy to understood by the users, so the accuracy important for quality of information. And the accuracy represents all organization actions. To get accurate information we need the right value. If someone gave inaccurate information, it is difficult to find who made the mistake. There are many reasons for inaccurate information. The most common case is when the user enters wrong value. Also inaccurate information may accrue by typographical mistake. To avoid this mistakes, the organization must find who has experience and skills for data entry and it must use the programs which discover the typographical mistake. Inaccurate information with the passage of time it be hard to avoided if no one update it(like the address, phone numbers)and the information going to be more inaccurate. Data analysis is only as good as the quality of data obtained during the data collection process. How can you ensure data accuracy and integrity? Here are three pointers.
  20. 20. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 20 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Data analysis is a very important part of the research process. Before performing data analysis, researchers must make sure that numbers in their data are as accurate as possible. Clicking the menus and buttons of statistical software applications like SPSS, Microstat, Statistica, Statview among others is easy, but if the data used in such automated data analysis is faulty, the results are nothing more than just plain rubbish. Garbage in, garbage out (GIGO). For many students who just want to comply with their thesis requirement, rigorous and critical data analysis are almost always given much less attention than the other parts of the thesis. At other times, data accuracy is deliberately compromised because of the apparent inconsistency of findings with expectedresults. Data should be as accurate, truthful or reliable as possible for if there are doubts about their collection, data analysis is compromised. Interpretation of results will be faulty that will lead to wrong conclusions. How can you make sure that your data is ready or suitable for data analysis? Here are three pointers to remember to ensure data integrity and accuracy. Thefollowing points focus on data collection during interviews. 3 Points to Remember to: Ensure Data Integrity and Accuracy 1. Review data entries Be meticulous about overlooked items in data collection. When dealing with numbers, ensure that the results are within sensible limits. Omitting a zero hereor adding a number there can compromise the accuracy of your data. Watch out for outliers, or those data that seems to be out-of-bounds or at the extremes of the scale of measurement. Verify if the outlier is truly an originalrecord of data collected during the interview. Outliers may be just typographical errors.
  21. 21. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 21 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 2. Verify the manner of data collection Cross-examine the data collector. If you asked somebody to gather data for you, throw him some questions to find out if the data was collected systematically or truthfully. For paid enumerators, there is a tendency to administer questionnaires in a hurry. In the process, many things will be missed and they will just have to fill-out missing items. To filter out this possibility, the information gathered should be cross-checked. Interview The following questions may be asked to ensure data quality.
  22. 22. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 22 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 How much time did you spend in interviewing the respondent of the study? Is the respondent alone or with a group of people when you did the interview? To reduce cheating in doing the interview, it will help if you tell your enumerators to have the interviewees sign the interview schedule right after they were interviewed. Ask the enumerators to write the duration of the interview, taking note of the start and end time of the interview. 1. Avoid biased results Watch out for the so-called ‘wildfire effect’ in data gathering. This happens when you are dealing with sensitive issues like fisherfolk’s compliance to ordinances, rules and regulations or laws of the land. Rumors on the issues raised by the interviewer during the interview will prevent other people from answering the questionnaire. Respondents may become apprehensive if answers to questions intrude into their privacy or threaten them in some way. Thus, questionnaire administration must be done simultaneously within, say, a day in a given group of interviewees in a particular place. If some of the respondents were interviewed the next day, chances are they have already gossiped among themselves and become wary of someone asking them about sensitive issues that may incriminate them. Wildfire effect is analogous to a small spark of a match that can ignite dry grass leaves and cause an uncontrollable forest fire. This is the power of the tongue. Hence, the term wildfire effect. There are many other sources of bias that impact negatively on data quality. These are described in greater detail in another post titled How to Reduce Researcher Bias in Social Research. Data analysis may then be employed once data accuracy and integrity are ensured.
  23. 23. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 23 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Self – check 6.1.1a Directions: Answer the following questions. Write your answer on a separatesheet. 1. What is accuracy? 2-4 What are the 3 Points to Remember to Ensure Data Integrity and Accuracy?
  24. 24. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 24 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Answer key 6.1.1a 1. Accuracy is to be ensuring that the information is correct and without anymistake. 2. Review data entries 3. Verify the manner of data collection 4. Avoid biased results
  25. 25. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 25 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 INFORMATION SHEET 6.2.1 Data Analysis techniques/procedures Learning Objective: After reading this information sheet, you must be able to understand techniques and procedures in Data Analysis Introduction: In our data-rich age, understanding how to analyze and extract true meaning from the digital insights available is one of the primary drivers of success. What is Data Analysis? Data analysis is a process that relies on methods and techniques to taking raw data, mining for insights that are relevant to the business’s primary goals, and drilling down into this information to transform metrics, facts, and figuresinto initiatives for improvement. Types of Data Analysis Domain Analysis In software engineering, domain analysis, or product line analysis, is the process of analyzing related software systems in a domain to find their common
  26. 26. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 26 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 and variable parts. It is a model of wider business context for the system. The term was coined in the early 1980s by James Neighbors. Domain
  27. 27. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 27 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 analysis is the first phase of domain engineering. It is a key method for realizingsystematic software reuse. Domain analysis produces domain models using methodologies such as domain specific languages, feature tables, facet tables, facet templates, and generic architectures, which describe all of the systems in a domain. Severalmethodologies for domain analysis have been proposed.
  28. 28. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 28 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 The products, or "artifacts", of a domain analysis are sometimes object- oriented models (e.g. represented with the Unified Modeling Language (UML)) or data models represented with entity-relationship diagrams (ERD). Software developers can use these models as a basis for the implementation of software architectures and applications. This approach to domain analysis is sometimes called model-driven engineering. In information science, the term "domain analysis" was suggested in 1995by Birger Hjørland and H. Albrechtsen. Several domain analysis techniques have been identified, proposed and developed due to the diversity of goals, domains, and involved processes.  DARE: Domain Analysis and Reuse Environment  Feature-Oriented Domain Analysis (FODA)  IDEF0 for Domain Analysis  Model Oriented Domain Analysis and Engineering To perform domain analysis, you gather information from whatever sources of information are available: these include the domain experts; any books about the domain; any existing software and its documentation, and any other documents he or she can find. The interviewing, brainstorming and use case analysis techniques discussed later in this chapter can help with domain analysis. Object oriented modelling, discussed in the next chapter, can also be of assistance. As a software engineer, you are not expected to become an expert in the domain; nevertheless, domain analysis can involve considerable work. The following benefits will make this work worthwhile:
  29. 29. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 29 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 • Faster development: You will be able to communicate with the stakeholders more effectively, hence you will be able to establish requirements more rapidly. Having performed domain analysis will help you to focus on the most important issues. • Better system: Knowing the subtleties of the domain will help ensure that the solutions you adopt will more effectively solve the customer’s problem. You will make fewer mistakes, and will know which procedures and standards to follow. The analysis will give you a global picture of the domain of application; this will lead to better abstractions and hence improved designs. • Anticipation of extensions: Armed with domain knowledge, you will obtain insights into emerging trends and you will notice opportunities for future development. This will allow you to build a more adaptable system. It is useful to write a summary of the information found during domain analysis. The process of organizing and writing this summary can help you gain a better grasp of the knowledge; the resulting document can help educate other software engineers who join the team later. We suggest that a domain analysis document should be divided into sections such as the following: A.Introduction: Name the domain, and give the motivation for performing the analysis. The motivation normally is that you are preparing to solve a particular problem by development or extension of a software system. B.Glossary: Describe the meanings of all terms used in the domain that are either not part of everyday language or else have special meanings. You must master this terminology if you want to be able to communicate with your customers and users. The terminology will appear in the user interface of the software as well as in the documentation. You may be able to refer to an existing glossary in some other document, rather than writing a new glossary. The section is best placed at the start of the domain analysis document so you can subsequently can use the defined terms.
  30. 30. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 30 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 C. General knowledge about the domain: Summarize important facts or rules that are widely known by the domain experts and which would normally be learned as part of their education. Such knowledge includes scientific principles, business processes, analysis techniques, and how any technology works. This is an excellent place to use diagrams; however, where possible point the reader for details to any readily accessible books or other documents. This general knowledge will help you acquire an understanding of the data you may have to process and computations you may have to perform. D.Customers and users: Describe who will or might buy the software, and in what industrial sectors they operate. Also, describe the other people who work in the domain, even peripherally. Mention their background and attitude as well as how they fit into the organization chart, and relate to each other. These people may become users. E. The environment: Describe the equipment and systems used. The new system or extensions will have to work in the context of this environment. F. Tasks and procedures currently performed: Make a list of what the various people do as they go about their work. It is important to understand both the procedures people are supposed to follow as well as the shortcuts they tend to take. For example, if people are supposed to enter certain information on a form, but rarely do, this suggests the information is not useful. Tasks listed in this section may be candidates for automation. G. Competing software: Describe what software is available to assist the usersand customers, including software that is already in use, and software on the market. Discuss its advantages and disadvantages. This information suggests ideas for requirements, and highlights mistakes to avoid. H.Similarities across domains and organizations: Understanding what is generic versus what is specific will help you to create software that might be more reusable or more widely marketable. Therefore, determine what distinguishes this domain and the customer’s organization from others, as well as what they have in common.
  31. 31. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 31 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Content Analysis Content analysis is a research tool used to determine the presence of certain words, themes, or concepts within some given qualitative data (i.e. text).Using content analysis, researchers can quantify and analyze the presence, meanings and relationships of such certain words, themes, or concepts. Uses of Content Analysis Identify the intentions, focus or communication trends of an individual,group or institution Describe attitudinal and behavioral responses to communications Determine psychological or emotional state of persons or groups Reveal international differences in communication content Reveal patterns in communication content Pre-test and improve an intervention or survey prior to launch Analyze focus group interviews and open-ended questions to complement quantitative data Types of Content Analysis There are two general types of content analysis: conceptual analysis and relational analysis. Conceptual analysis determines the existence and frequency of concepts in a text. Relational analysis develops the conceptual analysis further by examining the relationships among concepts in a text. Eachtype of analysis may lead to different results, conclusions, interpretations andmeanings.
  32. 32. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 32 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Conceptual Analysis Typically people think of conceptual analysis when they think of content analysis. In conceptual analysis, a concept is chosen for examination and the analysis involves quantifying and counting its presence. The main goal is to examine the occurrence of selected terms in the data. Terms may be explicit or implicit. Explicit terms are easy to identify. Coding of implicit terms is more complicated: you need to decide the level of implication and base judgments on subjectivity (issue for reliability and validity). Therefore, coding of implicit terms involves using a dictionary or contextual translation rules or both. To begin a conceptual content analysis, first identify the research question and choose a sample or samples for analysis. Next, the text must becoded into manageable content categories. This is basically a process of selective reduction. By reducing the text to categories, the researcher can focus on and code for specific words or patterns that inform the research question. Relational Analysis Relational analysis begins like conceptual analysis, where a concept ischosen for examination. However, the analysis involves exploring the relationships between concepts. Individual concepts are viewed as having noinherent meaning and rather the meaning is a product of the relationships among concepts. To begin a relational content analysis, first identify a research questionand choose a sample or samples for analysis. The research question must be focused so the concept types are not open to interpretation and can be summarized. Next, select text for analysis. Select text for analysis carefully bybalancing having enough information for a thorough analysis so results are notlimited with having information that is too extensive so that the coding process becomes too arduous and heavy to supply meaningful and
  33. 33. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 33 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 worthwhile results.
  34. 34. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 34 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Comparison/Comparative Technique According to Pickvance (2005), comparative analysis is conducted mainly to explain and gain a better understanding of the causal processes involved in the creation of an event, feature or relationship usually by bringing together variations in the explanatory variable or variables. Comparative research can betraced to a long history that has gained much attention in current research due to globalization, technological advances, etc. on cross- national platforms (Azarian, 2011). Conventionally, comparative analysis emphasized on the “explanation of differences, and the explanation of similarities” (p.2). This helps to establish relationships between two or more phenomena and provide valid reasons. Comparisons are now carried out on various levels being regional, national or wider geographical boundaries based on specific subject or area of interest. Types of Comparative Research There are several methods of doing comparative analysis and Tilly (1984) distinguishes four types of comparative analysis namely: individualizing, universalizing, variation-finding and encompassing (p.82). Adding to the types of comparative analysis, May (1993, as cited in Azarian 2011, p. 117) offers a four- folded typology, including the import-mirror view, the difference view, the theory- development view and, finally, the prediction view. These types are similar to that suggested by Tilly (1984) which are elaborated below.
  35. 35. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 35 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 a. Individualizing comparison contrasts ‘a small number of cases in order to grasp the peculiarities of each case’ (1984, p. 82). This basically involves describing fully the characteristics or features each of the cases being studied. This helps to broaden our knowledge and gives insight to see cases in-depth. This method cannot be said to be truly comparative but makes use of comparison in a small aspect of the research (Fredrickson, 1997). b. Universalizing comparison ‘aims to establish that every instance of a phenomenon follows essentially the same rule’ (1984, p. 82). This involves the use of comparison to develop fundamental theories with significant generality and relevance; goes to further to provide theories which explain the cases being studied. E.g. development of theories of industrialism, social revolutions etc. c. Variation-finding comparison seeks to ‘establish a principle of variation in the character or intensity of a phenomenon by examining systematic differences between instances’ (1984, p. 82). That is, comparing numerous forms of a single phenomenon to discover logical differences among instances and establish a standard of variation in the character or intensity of that phenomenon. E.g. Green (1997) study of the modern Jewish Diaspora and Moore (1966) study on Social Origins of Dictatorshipand Democracy. d. Encompassing comparison ‘places different instances at various locations within the same system, on the way to explaining their characteristics as a function of their varying relationships to the system as a whole’ (1984, p. 83). E.g. explaining the difference between two children’s behavior by their orders of birth, attributing the characteristicsof rural communities to their varying connections with a nearby city or urban area.
  36. 36. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 36 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Self – Check 6.2.1 Direction: Answer the following questions. Write your answer on a separate sheet. 1-3 What are the examples of Data Analysis 4-5 Types of Content Analysis 6-9 Types of Comparative Research10 – What is Data Analysis? 10 – What is Data Analysis?
  37. 37. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 37 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Answer Key 6.2.1 1. Domain Analysis 2. Content Analysis 3. Comparison/Comparative Technique 4. Conceptual Analysis 5. Rational Analysis 6. Individualizing comparison 7. Universalizing comparison 8. Variation-finding comparison 9. Encompassing comparison 10. Data analysis is a process that relies on methods and techniques to taking raw data, mining for insights that are relevant to the business’sprimary goals, and drilling down into this information to transform metrics, facts, and figures into initiatives for improvement.
  38. 38. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 38 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 INFORMATION SHEET 6.3.1 Reporting requirements to a range of audiences Learning Objective: After reading this information sheet, you must be able to understand important is reporting to a range of audiences in data analysis Introduction: At the start of the writing or communication process, carefully consider your “audience”—the person or persons who actually be reading your document, receiving your email, or watching your presentation. As a communicator, your primary goal is to transmit information efficiently and effectively. How you choose to transmit that information—the way it’s written and the form it takes— must depend to a large extent on who your audience is and what their goals are. 1. As a communicator, your primary goal is to transmit information efficientlyand effectively. Good communication is the result of a complex process that factors in your reader and their goals. Think of it as an act of translation—you possess information and knowledge, and you need to deliver that information to your audience in a way they will understand.
  39. 39. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 39 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 This process asks you to consider the language you use, but also the wayyou deliver the information (a document, a presentation, a diagram, a phone call). The same information might be communicated in multiple ways, depending on your audience and the context. 2. Audience and Purpose Affect Your Choices as a Communicator Even in a technical communication style, there are multiple ways to presentthe same information based on audience and purpose. Be prepared to communicate to many different types of audiences— youraudience must affect your decisions as a communicator. Factors that define audiences are:  their level of expertise or familiarity with the subject (e.g., a fellow engineer or aperson in a non-technical position in the company or a layperson),  their role or goals (what they will do with the information),  their position relative to the organization (internal or external), and  their position relative to you (peer, superior, or subordinate). A clearly stated purpose is a key feature in most technical and professional communications because it improves efficiency—your readershould know right away why they are reading your document. Some common purposes for technical communication are
  40. 40. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 40 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00  to inform  to recommend  to request  to propose  to persuade  to record  to instruct Most Important Things to Remember About Report Writing 1. Follow the report writing outline in your manual. Feel free to besomewhat flexible with the order, but don’t leave out whole sections. 2. Make your own internal outline including who is responsible for which sections. Be sure that you leave time for stakeholders to help you with editing/making revisions. 3. Be economical in your decisions about what to include in your report. Shorter is better. 4. Avoid excessive use of jargon.
  41. 41. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 41 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 3. Read your work – if you can’t understand it, chances are others won’t be able to either. Think, in simple terms, about what you are trying to say, and then write that. Use complete sentences and standard English grammar conventions. You can rely some on bullets and be limited in your transitions,but be sure your reader can follow your logic. 4. Formatting is your friend. Use headers and sections to help your reader know what is happening in your report. Be consistent about where and how they appear (centered, bold, underlined, side headings etc.). NUMBER THE PAGES. IF YOU’RE GENERATING A DRAFT THINK ABOUT DOUBLE-SPACING. 5. Use tables and Graphs to help illustrate findings. ALL TABLES AND GRAPHS MUST HAVE TITLES, LABELS AND LEGENDS OR FOOTNOTES SO THAT THEY STAND ALONE. 6. Use quotes and vignettes or snippets from field notes to illustrate yourfindings. Remember quotes should have quote marks around them and be attributed to the speaker or writer. If you are presenting field notes, be sure they are clearly identified and in context. 7. Be consistent in your use of language, capitalization, punctuation etc. For the most part, evaluation reports should be written in the past tense – onlyreport what you actually did and what you found. The action steps or Issues for Further Consideration sections can include references to future actions.
  42. 42. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 42 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 8. Do not introduce totally new topics into your report in the final sections. Do not use the report to explain why you changed your design, whatyou didn’t do, and what should be happening with a program regardless of the findings presented in the report.
  43. 43. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 43 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Self – check 6.3.1 Directions: Answer the following. Write your answer on a separate sheet. A. What are the Factors that define audiences? 1. 2. 3. 4. B. What are the common purposes for technical communication? 1. 2. 3. 4. 5. 6. 7.
  44. 44. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 44 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 Answer key 6.3.1 A. What are the Factors that define audiences? 1. their level of expertise or familiarity with the subject (e.g., a fellow engineer or a person in a non-technical position in the company or alayperson), 2. their role or goals (what they will do with the information), 3. their position relative to the organization (internal or external), and 4. their position relative to you (peer, superior, or subordinate). B. What are the common purposes for technical communication? 1. to inform 2. to recommend 3. to request 4. to propose 5. to persuade 6. to record 7. to instruct
  45. 45. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 45 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00 References 1. https://www.betterevaluation.org/en/resources/guides/collect_retri eve_dat a/collection_methods 2. http://www.omgcenter.org/pew- fund/downloads/pcbp- ReportWritingTips.pdf 3. https://ohiostate.pressbooks.pub/feptechcomm/chapter/2- audience/ 4. https://support.google.com/analytics/answer/7162572?hl=en 5. https://simplyeducate.me/2012/12/06/the-importance-of-data- accuracy- and-integrity-for-data- analysis/#:~:text=Data%20analysis%20is%20only%20as,during%20 the%20 data%20collection%20process.&text=Data%20should%20be%20as% 20accu rate,will%20lead%20to%20wrong%20conclusions. 6. https://www.unr.edu/research-integrity/human-research/human- research-protection-policy-manual/410-maintaining-data- confidentiality#:~:text=Confidentiality%20refers%20to%20the%20resear cher 's,participants%20is%20not%20improperly%20divulged. 7. https://www1.udel.edu/security/data/confidentiality.html
  46. 46. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 46 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00
  47. 47. CBLM In Practice Present Relevant Information Date Prepared: September 2022 Document No: Page 47 of 44 Issued By: PTC-DN Prepared By: Romally Antonette B. Tagnipez Revision #00

×