SlideShare una empresa de Scribd logo
1 de 13
Planning a Data Entry Operation
P.Prabhu
Manager Research
5th August 2013
Creating the Application
 The data entry application can be designed by one or by
multiple people
 It is advisable that one person or a team work on the dictionary
together
 After the dictionary is final, people can work on different forms
independently, which will then be copied-and-pasted together
for the final product
 Make sure to backup the application data files frequently; not
only might you make an unrecoverable mistake to your files, but
CSPro has been known to (very rarely) render applications
unusable
Operator and System Controlled Modes
 CSPro has two modes of data entry, which come about due to
the differences in CSPro’s parent software packages
 Operator-controlled mode: as in IMPS, which was designed for
census data entry, where speed of data entry is sometimes
prioritized over accuracy, and where the sheer volume of
keying means that office editing of questionnaires may not be
possible (heads-down keying)
 System-controlled mode: as in ISSA, which was designed for
survey data entry, where accuracy is critical, and where office
editing is often possible (heads-up keying)
Operator and System Controlled Modes (continued)
 Graphic borrowed from Macro International:
Operator-Controlled Mode System-Controlled Mode
Operator-Controlled Mode
 In operator-controlled mode, the keyer can use the mouse to move
around the questionnaire, bypassing fields or whole sections of the
data entry application
 The mouse can also be used to skip to fields after having keyed in an
invalid response for a value
 Mouse action can cause havoc, but it can also make the keyed data
more true to the data on the questionnaire, as it eliminates the need for
office editing (though the data will have to be edited later)
 Keyers generally like this mode, though programmers are often
reluctant to give so much control to the keyers
System-Controlled Mode
 System-controlled mode ensures that keyed data comes in a format
that the programmer has specified, with skip patterns obeyed and all
consistency checks passed
 CSPro keeps track of the “path” of data entry, so that going backwards
in the questionnaire faithfully returns to the previous fields keyed, which
may not be the previous fields on a form in the case of skips
 Requires that keyers resolve all errors before moving on in the
questionnaire, which can slow down progress
 A mistake in the programming of the application can ruin the integrity of
the data file
 Unless consistent office editing rules are followed, system-controlled
mode can introduce various biases in the data file
Network Data Entry
 In the past, each keyer entered data to a file on a computer and a
supervisor had to copy the data from each machine to a centralized
computer and concatenate the data
 Now, with LANs very easy to set up, it may be easier to have the
keyers enter data directly to a single machine
 It is not possible for multiple keyers to enter data to one data file, but
they can enter data to different files on a network drive
 The supervisor must still concatenate the data to create the master
data file, but backing up and concatenating data is much easier if using
a network drive
 Similarly, placing the data entry application on a network drive
eliminates the prior need to redistribute the application after any
modifications were made
Testing the Application
 As a CSPro programmer, you should test the application thoroughly
– Ensure that every skip pattern works successfully, and that all
consistency checks are valid
– Make sure any calls to a lookup file complete without error
 It is extremely important, however, to have someone without any
CSPro experience test the application
 A novice can often discover problems more quickly, and can uncover
different problems, than an expert user
 Ideally a data entry application will be created and tested before the
census or survey goes to the field
 Timing several keyers entering pilot or test data will help determine how
many keyers must be hired for the keying operation
Verifying Data
 Verifying census or survey data (double keying) adds significant
expense to a data entry operation, but it may be necessary to
ensure good quality keyed data, particularly for a survey
 Two forms of verification:
– Independent verification
– Dependent verification
Independent Verification
 Two keyers key a questionnaire to separate data files
 The operational control system should ensure that the keying
supervisor can easily identify in what files the two keyed
questionnaires are located
 The supervisor runs the Compare Data tool, which produces a
report identifying differences in the keyed files
 The supervisor then chooses one file as the source file for the
final data file and modifies that file, resolving all errors by
reexamining the paper questionnaire
Dependent Verification
 A keyer keys a questionnaire to a data file
 A second keyer takes the first keyer’s data file and keys the
questionnaires in the same order as the first keyer keyed them
 If the second keyer enters a value that differs from the value
entered by the first keyer, the second keyer is prompted to rekey
the value
 The second keyer, not a supervisor, is the arbitrator of the
correct value of a field
Verifying Data (continued)
 Independent verification advantages:
– Keyers will not be slowed down by mistakes made by the
other keyer
– May be more accurate because three people look at hard-to-
read fields
– The second keying does not need to be in the same order as
the first keying
 Dependent verification advantages:
– Can be faster than independent verification because of the
elimination of the supervisory position and the need to look
at the paper questionnaires a third time
– Eliminates the need for two copies of all data files
– Allows for the verification of only high priority fields
Moving to next
PSI

Más contenido relacionado

La actualidad más candente

Epi Info- An Statistical Software
Epi Info- An Statistical Software Epi Info- An Statistical Software
Epi Info- An Statistical Software Dr-Jitendra Patel
 
Class viii ch-2 log on to access
Class  viii ch-2 log on to accessClass  viii ch-2 log on to access
Class viii ch-2 log on to accessjessandy
 
Class viii ch-3 working with tables
Class  viii ch-3 working with tablesClass  viii ch-3 working with tables
Class viii ch-3 working with tablesjessandy
 
Normalisation
NormalisationNormalisation
Normalisationlistergc
 
Assessment questions
Assessment questionsAssessment questions
Assessment questionsshaila_A
 

La actualidad más candente (9)

Beautiful Research Data (Structured Data and Open Refine)
Beautiful Research Data (Structured Data and Open Refine)Beautiful Research Data (Structured Data and Open Refine)
Beautiful Research Data (Structured Data and Open Refine)
 
Faq dbms
Faq dbmsFaq dbms
Faq dbms
 
Epi Info- An Statistical Software
Epi Info- An Statistical Software Epi Info- An Statistical Software
Epi Info- An Statistical Software
 
Showcase 2
Showcase 2Showcase 2
Showcase 2
 
Class viii ch-2 log on to access
Class  viii ch-2 log on to accessClass  viii ch-2 log on to access
Class viii ch-2 log on to access
 
Spreadsheets
SpreadsheetsSpreadsheets
Spreadsheets
 
Class viii ch-3 working with tables
Class  viii ch-3 working with tablesClass  viii ch-3 working with tables
Class viii ch-3 working with tables
 
Normalisation
NormalisationNormalisation
Normalisation
 
Assessment questions
Assessment questionsAssessment questions
Assessment questions
 

Similar a CSPro workshop P- 2

Hrm database-management-java-project
Hrm database-management-java-projectHrm database-management-java-project
Hrm database-management-java-projectchetanmbhimewal
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk AnalysisBrett Leonard
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueEswar Publications
 
T R I A L M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L  M O N I T O R I N GQuality Remote Monitoring .docxT R I A L  M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L M O N I T O R I N GQuality Remote Monitoring .docxssuserf9c51d
 
Machine learning Courier.pptx
Machine learning Courier.pptxMachine learning Courier.pptx
Machine learning Courier.pptx17cse17GuruGanesh
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring systemVenkat Projects
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentationanuj_rakheja
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesFinalyear Projects
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...Finalyear Projects
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm LessonMaulen Bale
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
School management System
School management SystemSchool management System
School management SystemHATIM Bhagat
 
Data migration patterns special
Data migration patterns   specialData migration patterns   special
Data migration patterns specialManikandan Suresh
 
Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.docShangaviS2
 

Similar a CSPro workshop P- 2 (20)

Hrm database-management-java-project
Hrm database-management-java-projectHrm database-management-java-project
Hrm database-management-java-project
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
50120140501006 2
50120140501006 250120140501006 2
50120140501006 2
 
T R I A L M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L  M O N I T O R I N GQuality Remote Monitoring .docxT R I A L  M O N I T O R I N GQuality Remote Monitoring .docx
T R I A L M O N I T O R I N GQuality Remote Monitoring .docx
 
Machine learning Courier.pptx
Machine learning Courier.pptxMachine learning Courier.pptx
Machine learning Courier.pptx
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring system
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentation
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
School management System
School management SystemSchool management System
School management System
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Testing
TestingTesting
Testing
 
Data migration patterns special
Data migration patterns   specialData migration patterns   special
Data migration patterns special
 
Online-Voting-System.doc
Online-Voting-System.docOnline-Voting-System.doc
Online-Voting-System.doc
 

Último

➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...amitlee9823
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachBoston Institute of Analytics
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...amitlee9823
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...amitlee9823
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraGovindSinghDasila
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...amitlee9823
 
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...gajnagarg
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...gajnagarg
 
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...amitlee9823
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 

Último (20)

➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
 
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 

CSPro workshop P- 2

  • 1. Planning a Data Entry Operation P.Prabhu Manager Research 5th August 2013
  • 2. Creating the Application  The data entry application can be designed by one or by multiple people  It is advisable that one person or a team work on the dictionary together  After the dictionary is final, people can work on different forms independently, which will then be copied-and-pasted together for the final product  Make sure to backup the application data files frequently; not only might you make an unrecoverable mistake to your files, but CSPro has been known to (very rarely) render applications unusable
  • 3. Operator and System Controlled Modes  CSPro has two modes of data entry, which come about due to the differences in CSPro’s parent software packages  Operator-controlled mode: as in IMPS, which was designed for census data entry, where speed of data entry is sometimes prioritized over accuracy, and where the sheer volume of keying means that office editing of questionnaires may not be possible (heads-down keying)  System-controlled mode: as in ISSA, which was designed for survey data entry, where accuracy is critical, and where office editing is often possible (heads-up keying)
  • 4. Operator and System Controlled Modes (continued)  Graphic borrowed from Macro International: Operator-Controlled Mode System-Controlled Mode
  • 5. Operator-Controlled Mode  In operator-controlled mode, the keyer can use the mouse to move around the questionnaire, bypassing fields or whole sections of the data entry application  The mouse can also be used to skip to fields after having keyed in an invalid response for a value  Mouse action can cause havoc, but it can also make the keyed data more true to the data on the questionnaire, as it eliminates the need for office editing (though the data will have to be edited later)  Keyers generally like this mode, though programmers are often reluctant to give so much control to the keyers
  • 6. System-Controlled Mode  System-controlled mode ensures that keyed data comes in a format that the programmer has specified, with skip patterns obeyed and all consistency checks passed  CSPro keeps track of the “path” of data entry, so that going backwards in the questionnaire faithfully returns to the previous fields keyed, which may not be the previous fields on a form in the case of skips  Requires that keyers resolve all errors before moving on in the questionnaire, which can slow down progress  A mistake in the programming of the application can ruin the integrity of the data file  Unless consistent office editing rules are followed, system-controlled mode can introduce various biases in the data file
  • 7. Network Data Entry  In the past, each keyer entered data to a file on a computer and a supervisor had to copy the data from each machine to a centralized computer and concatenate the data  Now, with LANs very easy to set up, it may be easier to have the keyers enter data directly to a single machine  It is not possible for multiple keyers to enter data to one data file, but they can enter data to different files on a network drive  The supervisor must still concatenate the data to create the master data file, but backing up and concatenating data is much easier if using a network drive  Similarly, placing the data entry application on a network drive eliminates the prior need to redistribute the application after any modifications were made
  • 8. Testing the Application  As a CSPro programmer, you should test the application thoroughly – Ensure that every skip pattern works successfully, and that all consistency checks are valid – Make sure any calls to a lookup file complete without error  It is extremely important, however, to have someone without any CSPro experience test the application  A novice can often discover problems more quickly, and can uncover different problems, than an expert user  Ideally a data entry application will be created and tested before the census or survey goes to the field  Timing several keyers entering pilot or test data will help determine how many keyers must be hired for the keying operation
  • 9. Verifying Data  Verifying census or survey data (double keying) adds significant expense to a data entry operation, but it may be necessary to ensure good quality keyed data, particularly for a survey  Two forms of verification: – Independent verification – Dependent verification
  • 10. Independent Verification  Two keyers key a questionnaire to separate data files  The operational control system should ensure that the keying supervisor can easily identify in what files the two keyed questionnaires are located  The supervisor runs the Compare Data tool, which produces a report identifying differences in the keyed files  The supervisor then chooses one file as the source file for the final data file and modifies that file, resolving all errors by reexamining the paper questionnaire
  • 11. Dependent Verification  A keyer keys a questionnaire to a data file  A second keyer takes the first keyer’s data file and keys the questionnaires in the same order as the first keyer keyed them  If the second keyer enters a value that differs from the value entered by the first keyer, the second keyer is prompted to rekey the value  The second keyer, not a supervisor, is the arbitrator of the correct value of a field
  • 12. Verifying Data (continued)  Independent verification advantages: – Keyers will not be slowed down by mistakes made by the other keyer – May be more accurate because three people look at hard-to- read fields – The second keying does not need to be in the same order as the first keying  Dependent verification advantages: – Can be faster than independent verification because of the elimination of the supervisory position and the need to look at the paper questionnaires a third time – Eliminates the need for two copies of all data files – Allows for the verification of only high priority fields