0% found this document useful (0 votes)
39 views1 page

Data Gathering Procedure

WORD document

Uploaded by

Ryan Carlo Conde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views1 page

Data Gathering Procedure

WORD document

Uploaded by

Ryan Carlo Conde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Data Gathering Procedure

The researchers used tiger frogs (Hoplobatrachus rugulosus) collected from two different areas in
Lucban, Quezon. The areas used to conduct the study were performed in Brgy, Tinamnam anf Brgy.
Samil. Tiger frogs collected from the two different areas in Lucban to study the comparative analysis of
sexual dimorphism of tiger frog (Hoplobatrachus rugulosus) were observed in a qualitative and
quantitative way.
Qualitative observation were first used to identify, if theres a color differentiation or
dichromatism present in the frogs collected. Then on quantitative observation, which uses a one-way
ANOVA, the frogs were measured in its five (5) different parts, namely: snout-urostyle (SUL), hindlimbs, fore-limbs, Head width, and tympanum diameter. Females larger than 80 mm SUL (snout-urostyle
length) and males larger than 70 mm were considered to be adults, and others to be juveniles. Descriptive
analysis, using average values , standard error (range), and the significance level is set to a=0.05.
Data Analysis
The researchers analyzed and presented the data using textual and tabular form. The data
presented in descriptive statistics and tables helps the researchers in interpreting the results of the study.
Statistical Treatment

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy