Start learning 50% faster. Sign in now
Stratified sampling is a technique where the population is first divided into distinct subgroups or strata, which are based on specific characteristics that are relevant to the research question (e.g., age, income, or gender). Once these strata are identified, a sample is taken from each group, often in proportion to the size of the stratum in the overall population. Stratified sampling ensures that key subgroups are adequately represented in the sample, making it particularly useful when certain segments of the population may be underrepresented in a simple random sample. This technique increases the precision of the estimates by reducing sampling variability within each group. The other options are incorrect because: • Option 1 (Random selection) describes random sampling, not stratified sampling. • Option 3 (Systematic selection) is related to systematic sampling, not stratified sampling. • Option 4 (Data collection) is not specific to stratified sampling, where the strata are defined before sampling. • Option 5 (Variance) is a characteristic of the population, but it is not the basis for dividing the population in stratified sampling.
In the context of Data Modelling and Analytics, which technique is most suitable for identifying the underlying patterns in high-dimensional data withou...
In Data Structures, which of the following algorithms uses the Divide and Conquer strategy?
Which of the following is true about the Round Robin (RR) CPU scheduling algorithm?
Which of the following operations on a data structure refers to the removal of an element from the front of a queue?
In Database Management Systems, what is the primary purpose of normalization?
Which is not true about minimum spanning tree?
Which data structure is most suitable for implementing recursion?
Which of the following protocols is most commonly used in IoT devices to enable communication between smart devices?
In intelligent systems, which of the following is a key characteristic of an expert system?
Which of the following is considered the strongest type of encryption method in modern cyber security practices?