SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
SCENARIO 8-3
To become an actuary, it is necessary to pass a series of 10 dogs, including the most important one, an dog in probability and statistics. An insurance company wants to estimate the mean score on this dog for actuarial students who have enrolled in a special study program. They take a sample of 8 actuarial students in this program and determine that their scores are: 2, 5, 8, 8, 7, 6, 5, and 7. This sample will be used to calculate a 90% confidence interval for the mean score for actuarial students in the special study program.
17) Referring to Scenario 8-3, a 90% confidence interval for the mean score of actuarial students in the special program is from ________ to ________. 17) _____________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
18) True or False: Referring to Scenario 8-3, for the confidence interval to be valid, it is necessary that test scores of students in the special study program on the actuarial dog be normally distributed. 18) ______
A) True B) False
25) True or False: Referring to Scenario 8-6, this interval requires the use of the t distribution to obtain the confidence coefficient. 25) ______
A) True B) False
28) True or False: Referring to Scenario 8-6, it is possible that the true proportion of people that recognize the product is between 0.36 and 0.54. 28) ______
A) True B) False
In: Statistics and Probability
In: Finance
Q1) Velocity and acceleration: a ball is thrown verticality up word from the ground level with initial velocity of 2 feet per second and initial position 10 feet. Use a(t)=2cosā”(2x+3)
Find the equation of the velocity of the ball
After how many seconds is the velocity of the ball one
-half the initial velocity?
Find the equation of the motion of the ball
Calculate that displacement from t=1 till t=5
seconds
In: Math
Write a 1,050 word paper on funding a business, in which you:
In: Finance
Please upload your calculations (e.g., an Excel spreadsheet, a Word document, a PDF file, or a picture of your work) for Q21.
Q21. Consider a 2-year bond. The coupon rate of the bond is 10%, and the bond pays coupons semiannually. The bond is selling at a yield to maturity of 8.0% annually, or 4.0% semi-annually.
(a) What is the duration of the bond measured in half-years and in years? (10 points)
(b) If the semi-annually yield changes from 4.0% to 5.0%, what is the predicted change in the price of the bond (a dollar amount) using duration? (7 points)
(c) Suppose you are the company that is issuing this coupon bond. To immunize your liability, you would like to invest in a portfolio consists of one-year zero-coupon bonds and three-year zero-coupon bonds. What are the durations of the one-year zero and the three-year zero, respectively? What weight of the one-year zero will you need to hold for immunization? (5 points)
In: Finance
(a) Briefly describe what is meant by the word cryptography.
(b) Briefly describe the Vigenere cipher, including a discussion of the encryption and decryption processes.
(c) Describe what is meant by a āFeistel Cipherā.
(d) DES includes S-boxes as part of its encryption and decryption steps. Each of eight S-boxes is a fixed 4 Ć 16 array, whose entries come from the integers 0, 1, . . . , 15. Describe in detail how DES transforms a 48-bit string into a 32-bit string using the S-boxes.
(e) Without giving details of the algorithm, briefly discuss some of the shortcomings of DES.
THIS QUESTIONS FOR CRYPTOGRAPHY
In: Advanced Math
Experiment 2: Transcription and Translation 1. Use a pen or pencil to write a five word sentence using no more than eight different letters in the space below. 2. Now, use the red, blue, green, and yellow beads to form ācodonsā (three beads) for each letter in your sentence. Then, create codons to represent the āstart, āspaceā and stopā regions within your sentence. Write the sentence using the beads in the space below: 3. How many beads did you use? 4. Assign one Pop-ItĀ® bead to represent each codon. You do not need to assign a Pop-ItĀ® bead for the start, stop and space regions. These will be your amino acids. 5. Connect the Pop-ItĀ® beads to build the chain of amino acids that code for your sentence (leave out the start, stop, and space regions). 6. How many different amino acids did you use? 7. How many total amino acids did you use?
In: Biology
research the Caesar Cipher, and document your research in 2-3 pages in a Word document with illustrations in your document and provide an example of how the Caesar Cipher works while encrypting and decrypting a sample message. Also, add its history and its internal workings.
Summary of the areas to complete:
- Research the Caesar Cipher.
- Show its Encryption Method in details.
- Show its Decryption Method in details.
- Describe its History and what it was used for.
- Describe its Algorithms in details.
- Add Graphical Illustrations of its algorithms.
- Give an Example for Encrypting and Decrypting a text message.
- Write a Java, C/C++, or Python code and run it to complete the example message.
In: Computer Science
Write a 200-250 word summary of this passage:
The Governmentās Position on Illegal Mining
Laws in South Africa prohibit any one without a license to mine or process gold. However, local authorities lack the manpower needed to properly monitor the thousands of abandoned mine shafts. The South African government is concerned that the large number of āfreelanceā miners, coupled with a decline in some sectors (e.g. gold) is having a significant negative impact on tax revenues. South Africaās Chamber of Mines, an industry association, estimates that South Africa loses about 5% of its potential annual mineral production to illegal mining. This lost production is valued at around $2 billion. The government estimated that in 2010, it had lost approximately $500 million in tax revenues and [lost] export revenue due to illegal mining 8). These lost funds could have been used to support much-needed social service programs for the countryās poor and unemployed.
In: Economics
Write a 200-300 word summary of this passage:
The Mining Unions
The major mining companies are responsible for employing the workers, generating profits and maintaining the mines. When the mines are operational, and in āworking conditionā or legally open for mining, the National Union of Mineworkers (also known as NUM) organizes all the legally hired mineworkers. NUM has been known to state that low level illegal miners are paying the price for the negative effects of illegal mining while the syndicates are making millions. (The kingpins are becoming richer at the expense of the individual, defenseless illegal miners, prompting parallels between this illegal activity and the economics of the illegal drug trade in the U.S.). In a rarely issued statement on the subject of illegal mining on February 21, 2014, NUM stated that āany business and government that is serious about its people must take urgent steps to tackle this (illegal mining).ā The union urges all companies to put more effort and seriousness to close and tighten deserted mines. Illegal mining is not only a manifestation of negligence by mining companies, it is also a challenge to the security of the state and must be responded to accordingly. With the exception of this statement, the NUM has largely ignored the plight of the illegal mine workers. They are, after all, not dues-paying members of the union, and as a result, are not the unionās primary concern.
In: Economics