Questions
TCP Wireshark Lab – Working with a remote server.  You will go through the steps below, use...

TCP Wireshark Lab – Working with a remote server.  You will go through the steps below, use your captured wireshark file and the provided wireshark file (on D2L) to answer the questions.  When you have finished the lab you will submit the following:

  1. This document with your answers provided in the appropriate places.  
  2. Your wireshark capture file as a zipped file.  

STEPS:

1. Start up your web browser. Go thehttp://gaia.cs.umass.edu/wireshark-labs/alice.txtand retrieve an ASCII copy of Alice in Wonderland. Store this file somewhere on your computer.

2. Next go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark-file1.html.

3. Use the Browse button in this form to enter the name of the file (full path name) on your computer containing Alice in Wonderland (or do so manually). Don’t press the “Upload alice.txt file” button, yet!

4. Now start up Wireshark and begin packet capture (Capture->Start) and then press OK on the Wireshark Packet Capture Options screen (we’ll not need to select any options here).

5. Returning to your browser, press the “Upload alice.txt file” button to upload the file to the gaia.cs.umass.edu server. Once the file has been uploaded, a short congratulations message will be displayed in your browser window.

6. Stop Wireshark packet capture and save your capture file. Your Wireshark window should look similar to the window shown below.

———————————————————————————————————————————————————————-

PART 2: A first Look At the Captured Trace  

Use the provided online capture (uploaded in D2L as a zip file – you will need to extract it before opening in Wireshark) to answer the following:

1. What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? To answer this question, it’s probably easiest to select an HTTP message and explore the details of the TCP packet used to carry this HTTP message, using the “details of the selected packet header window”.  (5 pts answer, 5 pts explanation of which packet # you used to answer this question)

2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection? (5 pts for answer, 5 pts for explanation of which packet # )

Use your own Captureto answer the following:

3. What is the IP address and TCP port number used by your client computer (source) to transfer the file to gaia.cs.umass.edu? (10 pts – with screenshot of your capture)

———————————————————————————————————————————————————————-

PART 3: TCP Basics

4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment? (5 pts for answer, 5 pts for packet #)

5. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment? (5 pts for answer , 5 pts for screenshot of highlighted packet)

6. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you’ll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a “POST” within its DATA field. (5 pts for answer, 5 pts for screenshot of highlighted packet)

7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection. What are the sequence numbers of the first six segments in the TCP connection (including the segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for each segment received? (10 pts)

8. What is the length of each of the first six TCP segments? (10 pts)

9. What is the minimum amount of available buffer space advertised at the received for the entire trace? Does the lack of receiver buffer space ever throttle the sender? (10 pts)

10. Are there any retransmitted segments in the trace file? What did you check for (in the trace) in order to answer this question? (10 pts)

———————————————————————————————————————————————————————-

PART 4: TCP Congestion Control In Action

STEPS:

1. Select a TCP segment in the Wireshark’s “listing of captured-packets” window. Then select the menu : Statistics->TCP Stream Graph-> Time-SequenceGraph(Stevens).  

QUESTIONS:

Answer Question 11 Using the provided Capture (Bonus: 10 pts)

11. Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence number versus time plot of segments being sent from the client to the gaia.cs.umass.edu server. Can you identify where TCP’s slowstart phase begins and ends, and where congestion avoidance takes over? Insert a screenshot of your Time-Sequence-Graph and explain your answer.

In: Computer Science

Lynn et al., (2012). Dissociation and dissociative disorders: Challenging conventional wisdom The current (fourth) edition of...

Lynn et al., (2012). Dissociation and dissociative disorders: Challenging conventional wisdom

The current (fourth) edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV-TR) defines dissociation as “a disruption in the usually integrated functions of consciousness, memory, identity, or perception of the environment” (American Psychiatric Association, 2000, p. 519). Many psychologists and psychiatrists view dissociation as a coping mechanism designed to deal with overpowering stress (Dell & O’Neil, 2009). One well-known form of dissociation is depersonalization, in which individuals feel disconnected from themselves; they may feel like an automaton or feel as if they are watching themselves from a distance. Another is derealization, in which individuals feel disconnected from reality; they may feel as though they are in a dream or that things seem to be moving in slow motion. Steven Spielberg’s 1998 film, Saving Private Ryan, vividly depicts an episode of derealization (spoiler alert): After being shot, Captain John Miller (portrayed by Tom Hanks) witnesses the events around him unfolding as if in a silent, slow-motion movie. Certain forms of dissociation are widespread in the general population; for example, most estimates suggest that nearly 50% of individuals have experienced depersonalization at some point in their lives (Aderibigbe, Bloch, & Walker, 2001). When mild and intermittent, such symptoms are rarely of clinical concern. Nevertheless, in some cases, dissociation may take the form of grossly impairing dissociative disorders. These puzzling conditions include dissociative identity disorder (DID), formerly known as multiple personality disorder, dissociative fugue, and depersonalization disorder. In the best known dissociative disorder, DID, individuals supposedly develop multiple coexisting personalities, known as “alters.” In dissociative fugue, individuals purportedly suddenly forget their past, travel from home or work (fugue has the same root as fugitive), and adopt a new identity; in depersonalization disorder, individuals experience frequent bouts of depersonalization, derealization, or both. Dissociation also features prominently in other psychological conditions not formally classified as dissociative disorders, such as panic disorder, borderline and schizotypal personality disorders, and posttraumatic stress disorder. The origins of dissociation are poorly understood. Nevertheless, the clinical literature on dissociation has been marked by three widely accepted assumptions associated with what is often referred to as the posttraumatic model. Specifically, it has long been assumed that chronic dissociation is (a) a coping mechanism to deal with intense stressors, especially childhood sexual and physical trauma; (b) accompanied by cognitive deficits that interfere with the processing of emotionally laden information; and (c) marked by an avoidant informationprocessing style characterized by a tendency to forget painful memories. The coping mechanism outlined in (a) is typically assumed to play a key causal role in dissociative disorders. For example, many authors have argued that DID reflects individuals’ attempts to “compartmentalize” and obtain psychological distance from traumatic experiences such as child abuse (Dell & O’Neil, 2009). In this article, we review recent research that calls these widespread assumptions into question and proposes novel and scientifically supported approaches for conceptualizing dissociation and dissociative disorders.

The Posttraumatic Model The posttraumatic model (Bremner, 2010; Gleaves, 1996) is ostensibly supported by very high rates—sometimes exceeding 90%—of reported histories of childhood trauma, most commonly child sexual abuse, among patients with DID and perhaps other dissociative disorders (Gleaves, 1996; Simeon, Guralnik, Schmeidler, Sirof, & Knutelska, 2001). Nevertheless, a number of authors (e.g., Giesbrecht, Lynn, Lilienfeld, & Merckelbach, 2008, 2010; Kihlstrom, 2005; Merckelbach & Muris, 2001; Piper & Merskey, 2004; Spanos, 1994, 1996) have questioned the oft-cited link between child abuse/ maltreatment and dissociation for several reasons. First, in most studies (e.g., Ross & Ness, 2010), objective corroboration of abuse is lacking. Second, the overwhelming majority of studies of self-reported trauma and dissociation are based on cross-sectional designs that do not permit causal inferences; in these designs, individuals are typically assessed for DID or other dissociative disorders and asked to recollect whether they had been abused or neglected in childhood. Prospective studies that circumvent the pitfalls of such retrospective reporting often fail to substantiate a link between childhood abuse and dissociation in adulthood (Giesbrecht et al., 2008; but see Bremner, 2010). Third, researchers have rarely controlled for overlapping conditions or symptoms, such as those of anxiety, eating, and personality disorders, raising the possibility that the correlates of abuse are not specific to dissociative disorders. Fourth, the reported high levels of child abuse among DID patients may be attributable to selection and referral biases (Pope & Hudson, 1995); for example, individuals with dissociative disorders may be especially likely to enter treatment if they are struggling with problems stemming from early abuse. Fifth, correlations between abuse and psychopathology decrease substantially or disappear when participants’ perception of family pathology is controlled statistically (Nash, Hulsey, Sexton, Harralson, & Lambert, 1993), which could mean that this association is due to global familial maladjustment rather than abuse itself. These five points of contention suggest ample reasons to be skeptical of the claim that child abuse plays a central or direct causal role in DID—although, as we will suggest later, it may be one element of the complex etiological network that contributes to this condition. The Sociocognitive Model In contrast to the posttraumatic model, the sociocognitive model (Spanos, 1994; see also Aldridge-Morris, 1989; Lilienfeld et al., 1999; McHugh, 1993; Sarbin, 1995) proposes that DID is a consequence of social learning and expectancies. This model holds that DID results from inadvertent therapist cueing (e.g., suggestive questioning regarding the existence of possible alters, hypnosis for memory recovery, sodium amytal), media influences (e.g., television and film portrayals of DID), and sociocultural expectations regarding the presumed clinical features of DID. In aggregate, the sociocognitive model posits that these influences can lead predisposed individuals to become convinced that indwelling entities— alters—account for their dramatic mood swings, identity changes, impulsive actions, and other puzzling behaviors (see below). Over time, especially when abetted by suggestive therapeutic procedures, efforts to recover memories, and a propensity to fantasize, they may come to attribute distinctive memories and personality traits to one or more imaginary alters. A number of findings (e.g., Lilienfeld & Lynn, 2003; Lilienfeld et al., 1999; Piper, 1997; Spanos, 1994) are consistent with the sociocognitive model and present serious challenges to the posttraumatic model. For example, the number of patients with DID, along with the number of alters per DID patient, increased dramatically from the 1970s to the 1990s (Elzinga, van Dyck, & Spinhoven, 1998), although the number of alters at the time of initial diagnosis appears to have remained constant (North, Ryall, Ricci, & Wetzel, 1993). In addition, the massive increase in reported cases of DID followed closely upon the release in the mid-1970s of the bestselling book (turned into a widely viewed television film in 1976), Sybil (Schreiber, 1973), which told the story of a young woman with 16 personalities who reported a history of severe child abuse at the hands of her mother (see Nathan, 2011; Rieber, 2006, for evidence that many details of the Sybil story are inaccurate). Manifestations of DID symptoms also vary across cultures. For example, in India, the transition period as the individual shifts between alter personalities is typically preceded by sleep, a presentation that reflects common media portrayals of DID in that country (North et al., 1993). Moreover, mainstream treatment techniques for DID often reinforce patients’ displays of multiplicity (e.g., asking questions like, “Is there another part of you with whom I have not spoken?”), reify alters as distinct personalities (e.g., calling different alters by different names), and encourage patients to establish contact and dialogue with presumed alters. Interestingly, many or most DID patients show few or no clear-cut signs of this condition (e.g., alters) prior to psychotherapy (Kluft, 1984), raising the specter that alters are generated by treatment. Indeed, the number of alters per DID individual tends to increase substantially over the course of DID-oriented psychotherapy (Piper, 1997). Curiously, psychotherapists who use hypnosis tend to have more DID patients in their caseloads than do psychotherapists who do not use hypnosis (Powell & Gee, 1999), and most DID diagnoses derive from a small number of therapy specialists in DID (Mai, 1995), again suggesting that alters may be created rather than discovered in therapy. These sources of evidence do not imply that DID can typically be created in vacuo by iatrogenic (therapist-induced) or sociocultural influences. Sociocognitive theorists acknowledge that iatrogenic and sociocultural influences typically operate against a backdrop of preexisting psychopathology. Indeed, the sociocognitive model is consistent with findings that many or most patients with DID, and to a lesser extent other dissociative disorders, meet criteria for borderline personality disorder, a condition marked by extremely unstable behaviors, such as unpredictable shifts in mood, impulsive actions, and self-mutilation (Lilienfeld et al., 1999). Individuals with this disorder are understandably seeking an explanation for their bewildering behaviors. The presence of hidden alters may be one such explanation, and it may assume particular plausibility when suggested by psychotherapists or sensational media portrayals. Cognitive Mechanisms of Dissociation Much of the literature on cognitive mechanisms of dissociation is more consistent with the sociocognitive model than with the posttraumatic model. For example, researchers have found little evidence for inter-identity amnesia among patients with DID using objective measures of memory (e.g., eventrelated potentials or behavioral tasks; Allen & Movius, 2000; Huntjens et al., 2006). In such studies, investigators present certain forms of information to one alter and see whether it is accessible to another alter. In most cases, it is, demonstrating that alters are not psychologically distinct entities. Contradicting the claim that individuals with heightened dissociation are defending against the impact of threat-related information and therefore exhibit slower or impaired processing of such information, patients with DID and other “high dissociators” display better memory for to-be-forgotten sexual words in directed-forgetting tasks (Elzinga, de Beurs, Sergeant, van Dyck, & Phaf, 2000). This finding is strikingly discrepant with the presumed coping function of dissociation. Studies of cognitive inhibition in highly dissociative clinical and nonclinical samples typically find a breakdown in such inhibition, challenging the widespread idea that amnesia (i.e., extreme inhibition) is a core feature of dissociation (Giesbrecht et al., 2008, 2010). The extant evidence therefore questions the widespread assumption that dissociation is related to avoidant information processing and suggests that apparent gaps in memory in interidentity amnesia, or dissociative amnesia more generally, could reflect intentional failures to report information. Moreover, the literature indicates that dissociation is marked by a propensity toward false memories, possibly mediated by heightened levels of suggestibility, fantasy proneness, and cognitive failures (e.g., lapses in attention). Indeed, at least 10 studies from diverse laboratories have confirmed a link between dissociation and fantasy proneness. In addition, heightened levels of fantasy proneness are associated with the tendency to overreport autobiographical memories and the false recall of aversive memory material (Giesbrecht et al., 2010). Accordingly, the relation between dissociation and fantasy proneness may explain why individuals with high levels of dissociation are especially prone to develop false memories of emotional childhood events. This explanation dovetails with data revealing links between dissociative symptoms and hypnotizability (Frischholz, Lipman, Braun, & Sachs, 1992) and high scores on the Gudjonsson Suggestibility Scale (Merckelbach, Muris, Rassin, & Horselenberg, 2000). Similarly, dissociation increases the number of commission memory errors (e.g., confabulations/false positives, problems discriminating perception from imagery) but not omission memory errors, which are presumably associated with dissociative amnesia (Holmes et al., 2005). These findings, together with research demonstrating a link between dissociation and cognitive failures, point to an association between a heightened risk of confabulation and pseudomemories. They also raise questions regarding the accuracy of retrospective reports of traumatic experiences. Still, these findings do not exclude some role for trauma in dissociation. Suggestibility, cognitive failures, and fantasy proneness could contribute to an overestimation of a genuine, although perhaps modest, link between dissociation and trauma. Alternatively, early trauma might predispose individuals to develop high levels of fantasy proneness, absorption (the tendency to become immersed in sensory or imaginative experiences; Tellegen & Atkinson, 1974), or related traits. In turn, such traits may render individuals susceptible to the iatrogenic and cultural influences posited by the sociocognitive model, thereby increasing the likelihood of DID. Sleep, Memory, and Dissociation A recent theory connecting sleep, memory problems, and dissociation may provide a conceptual bridge between the posttraumatic model and the sociocognitive model. In a review of 23 studies, van der Kloet, Merckelbach, Giesbrecht, and Lynn (2011) concluded that data from clinical and nonclinical samples provide strong support for a link between dissociative experiences and a labile sleep–wake cycle. This link, they contend, is evident across a range of sleep-related phenomena, including waking dreams, nightmares, and hypnagogic (occurring while falling asleep) and hypnopompic (occurring while awakening) hallucinations. Supporting this hypothesis, studies of the association between dissociative experiences and sleep disturbances have generally yielded modest correlations (in the range of .30 to .55), implying that unusual sleep experiences and dissociation are moderately related constructs (see also Watson, 2001). Nevertheless, these studies typically relied on cross-sectional designs. To address this limitation, Giesbrecht, Smeets, Leppink, Jelicic, and Merckelbach (2007) deprived 25 healthy volunteers of one night of sleep and found that sleep loss engenders a substantial increase in dissociative symptoms. They also found that this increase could not be accounted for by mood changes or response bias. van der Kloet, Giesbrecht, Lynn, Merckelbach, and de Zutter (in press) later conducted a longitudinal investigation of sleep experiences and dissociative symptoms among 266 patients who were evaluated on arrival and at discharge 6 to 8 weeks later. Sleep hygiene was a core treatment component. Prior to treatment, 24% of participants met the clinical cut-off for dissociative disorders (i.e., Dissociative Experiences Scale > 30; Bernstein-Carlson & Putnam, 1993); at follow-up, this number dropped to 12%. Although sleep improvements were associated with a reduction in global psychopathology (e.g., anxiety, depression), this reduction did not account fully for the specific effect of treatment on dissociation. The fact that a sleep-hygiene intervention reduces dissociative symptoms independent of generalized psychopathology bears noteworthy clinical implications. It also suggests that researchers may wish to revisit the treatment of dissociative disorders. Surprisingly, this clinically important area has received minimal investigation: For example, Brand, Classen, McNary, and Zaveri (2009) reported that only eight nonpharmacological studies, none of which was a well-controlled randomized trial, have examined treatment outcomes for DID. van der Kloet et al.’s (in press) findings suggest an intriguing interpretation of the link between dissociative symptoms and deviant sleep phenomena (see also Watson, 2001). According to their working model, individuals with a labile sleep– wake cycle experience intrusions of sleep phenomena (e.g., dreamlike experiences) into waking consciousness, in turn fostering dissociative symptoms. This labile sleep–wake cycle may stem in part from a genetic propensity (Lang, Paris, Zweig-Frank, & Livesley, 1998), distressing trauma-related memories, or other unknown causal influences. van der Kloet et al.’s model further proposes that disruptions of the sleep– wake cycle degrade memory and attentional control, thereby accounting for, or at least contributing to, the cognitive deficits of highly dissociative individuals. Accordingly, the sleep-dissociation perspective may explain (a) how aversive events disrupt the sleep–wake cycle and increase vulnerability to dissociative symptoms, and (b) why dissociation, trauma, fantasy proneness, and cognitive failures overlap. Thus, this perspective is commensurate with the possibility that trauma engenders sleep disturbances that in turn play a pivotal role in the genesis of dissociation and suggests that competing theoretical perspectives may be amenable to integration. The SCM holds that patients become convinced that they possess multiple selves as a by-product of suggestive media, sociocultural, and psychotherapeutic influences. Their sensitivity to suggestive influences may arise from increased salience of distressing memories (some of which may stem in part from trauma) and susceptibility to memory errors and a propensity to fantasize and experience difficulties in distinguishing fantasy from reality, brought about at least in part by sleep disruptions. The data we have summarized have received only scant attention in the clinical literature. Nevertheless, they have the potential to reshape the conceptualization and operationalization of dissociative disorders in the upcoming edition of the Diagnostic and Statistical Manual of Mental Disorders (DSMV, publication scheduled in 2013). In particular, they suggest that sleep disturbances, as well as sociocultural and psychotherapeutic influences, merit greater attention in the conceptualization and perhaps classification of dissociative disorders (Lynn et al., in press). From this perspective, the hypothesis that dissociative disorders can be triggered by (a) a labile sleep cycle that impairs cognitive functioning, combined with (b) highly suggestive psychotherapeutic techniques, warrants empirical investigation. More broadly, the data reviewed point to fruitful directions for our thinking and research regarding dissociation and dissociative disorders in years to come.

Respond to whether you think DID (Dissociative Identity Disorder) “exists” and what you mean by that. In your opinion, do you think it exists? What do you think DID is and what causes it and why?

In: Psychology

This question is concerned with an extension to the flashcard problem you studied in Block 3...

This question is concerned with an extension to the flashcard problem you studied in Block 3 Part 2.

In the original flashcard problem, a user can ask the program to show an entry picked randomly from a glossary. When the user presses return, the program shows the definition corresponding to that entry. The user is then given the option of seeing another entry or quitting.

A sample session might run as follows:

Enter s to show a flashcard and q to quit: s Define: word1 Press return to see the definition definition1 Enter s to show a flashcard and q to quit: s Define: word3 Press return to see the definition definition3 Enter s to show a flashcard and q to quit: q

The flashcard program is required to be extended as follows:

Box 1 – Specification of extended problem

As well as being offered a choice between seeing a flashcard or quitting, the user is offered the option of seeing a definition first.

If the user chooses this option, the program picks an entry at random from the glossary and shows the definition for that entry. It then asks the user what word is being defined. When the user presses return the program shows the word concerned.

The user is then given the option of seeing another flashcard, seeing another definition, or quitting.

Apart from this the program behaves like the original version

A sample dialogue might run as follows: (the additional dialogue is underlined.)

Enter s to show a flashcard, d to see a definition, or q to quit: s Define: word3 Press return to see the definition definition3 Enter s to show a flashcard, d to see a definition, or q to quit: d What word is defined by: definition2 Press return to see the word word2 Enter s to show a flashcard, d to see a definition, or q to quit: q

Box 2 – Keeping a notebook

As you work through part (a) of this question you should keep a notebook. You will need this for your answer to part (a)(vi). This should be very brief: it is simply a record of your personal experience while working on the task and what you feel you have learned from it.

In your notebook we suggest that you record the following information

How A brief description of how you went about the task.
Resources What documentation if any you consulted (including course materials and any online sources) and which you found most useful. There is no need for full references, just note the source, and in the case of the course materials what the relevant part and section or activity was.
Difficulties Anything you found difficult about the task, and how you dealt with it.
Lessons learnt Anything you learned from the task that would be useful if you faced a similar problem in the future.

There is more than one way of solving the extended problem but the approach we ask you to follow for this TMA starts by addressing the sub-problem of showing the definition for a random entry and, after the user enters return, showing the word being defined.

  • a.

    • i.Begin by writing an algorithm for the subproblem, show definition, described in the middle paragraph of Box 1 above, and repeated here for convenience:

      … the program picks an entry at random from the glossary and shows the definition for that entry. It then asks the user what word is being defined. When the user presses return the program shows the word concerned.

      At this stage no looping is involved and the steps of the algorithm only need to do what is asked for in the paragraph above and nothing more.

      The steps of your algorithm must be written in English and not use any Python code. The algorithm should be high-level and at a similar level of detail to the solution to Activity 2.24 of Block 3 Part 2, where an algorithm is given for show flashcard.

    • ii.Next you will translate your algorithm into Python code.

      Begin with the first complete version of the flashcard program, a copy of which is included in the download for this TMA as Q2.py. Save a copy this program as Q2_OUCU.py (where OUCU is your OU computer username, e.g. abc123).

      In the next few question parts, you will be amending this file. You will only have to submit the final amended file (as per the instructions in Part v).

      Add a new function show_definition() to the program, which translates into Python the steps of the algorithm you wrote in Part i. You should insert the new function just after the show_flashcard() function.

      Make sure you write a suitable docstring for the function.

      Include your code that defines the function show_definition() in your Solution document.

    • iii.When you have written the show_definition() function test it by calling it several times in the shell. Remember to first run the program and only after that use the shell to call the function.

      Debug the code and/or algorithm as necessary. If you need to make modifications you should record them in your notebook.

      Copy and paste an example test into your Solution Document. This should demonstrate a definition being shown, the user being asked to enter return, and then the program showing the word concerned.

      Alternatively, if you were unable to get the function working correctly, you should still paste in an example test, and explain briefly how the results are different from what you were expecting.

    • iv.Now you need to make changes to the part of the program that implements the interactive loop, so the user is offered the additional option of seeing a definition, and if they choose this option the show_definition() function is called.

      Once you have made the changes, run the whole program. Copy a test dialogue into your Solution document to show the user selecting the option to see a definition, then being asked what word it defines, and then been shown the word concerned.

      Include your amended code for the interactive loop in your Solution document.

      Alternatively, if you were unable to produce a test dialogue because you could not get the program to function as intended, you should briefly explain how a successful test dialogue would look.

    • v.Next modify the docstring for the program as a whole to reflect the changes you have made.

      Save your final version of the Python program and submit it as Q2_OUCU.py (where OUCU is your OU computer username, e.g. abc123) in your TMA zip file.

      Also paste a copy of your final Python program into your solution document as text.

    • vi.Finally, copy the notebook you have kept for this question into the corresponding part of your Solution Document.

  • b.Suggest one further small extension or improvement of your own to the modified flashcard program. Outline what the extension does and include any additional algorithm step(s) needed, either in the functions, or in the interactive loop. Note that you are only required to describe the extension, as specified above, and do not need to implement it in code.

In: Computer Science

The researcher from Scenario I decides to compare a second dose-effect curve with carboxycotton to determine...

The researcher from Scenario I decides to compare a second dose-effect curve with carboxycotton to determine if the novel opioid has the capacity to induce tolerance (i.e., a rightward shift in the dose-effect function; a larger dose is required to produce the same effect). The researcher takes the carboxycotton-treated mice from the first experiment (subjects 6-10 from above) and administers cumulative doses of carboxycotton. He then measures tail withdrawal latency as before. On the following day, he administers cumulative doses of carboxycotton again to determine if tolerance development occurred. The results of this experiment are presented in the table below.

Carboxycotton ED50 values

Subject

ED50 (mg/kg) from first dose-effect curve

ED50 (mg/kg) from second dose-effect curve

6

0.10

0.25

7

0.35

0.15

8

0.80

0.75

9

0.95

1.00

10

0.50

0.63

  1. Write the name of the specific statistical test that is appropriate for these data: ______________________

  1. Perform the test you identified inquestion 7 above using the statistical software (e.g., GraphPad Prism, Excel, R) of your choice. Be sure to perform a two-tailed test. Please round all answers to two decimal places, where appropriate.

  1. Report the mean of differences between dose-effect curves: _______________
  2. Report the standard deviation of differences between dose-effect curves: __________________
  3. Report the standard error of the mean of differences between dose-effect curves: __________________
  4. Report the results of the statistical test in the spaces below:

                        t( ____) = _____, p = _______

  1. Report the 95% confidence interval (LL,UL) for the difference between dose-effect curves:

______________________

  1. Compare the results from the 95% confidence interval in question 9 with the results from the statistical test in question 8. Is there sufficient evidence to reject the H0 and claim that that there is a potency difference between the first dose-effect curve and the second dose-effect curve in carboxycotton-treated mice?

Yes or No (circle one)

In: Statistics and Probability

Our textbook specifically discusses our country's lack of preparedness for a pandemic in Chapter 13, page...

Our textbook specifically discusses our country's lack of preparedness for a pandemic in Chapter 13, page 274 under the "Epidemics, Ethics, and Public Health" heading. Much has been discussed by public health officials in articles and news stories in the past few months regarding the lack of official expert forums, epidemic protocols, and medical supplies prepared for such a disaster as we are now experiencing, albeit at a global level. As aptly predicted in the quote below, the US medical community was waylaid by the effects of the global pandemic caused by Coronavirus.

"In the United States, response to the influenza pandemics across all 50 states involved the development of emergency policies and plans for future influenza outbreaks; however, only 6 states had written guidelines for ethical decision-making in such emergencies. Scholars have noted that this low number is concerning because of the ethical responsibilities around medication rationing, isolation, and quarantine that often occur during pandemics. To better prepare for future disease outbreaks, governments should have predetermined ethical decision-making procedures for public health agencies to follow in emergencies." (Morrison & Furlong, 2019).

Please consider the following in your discussion board post:

  1. Read the following article discussing the ethical and legal responsibilities to our communities in light of the novel Coronavirus pandemic: "Responding to COVID‐19: How to Navigate a Public Health Emergency Legally and Ethically."
  2. Create a discussion board post expounding on one way the textbook chapter mentions a learned public health strategy (from past epidemics or pandemics) or suggested overall changes to epidemic/pandemic preparedness that the US did not take into practice (prior to the start of the Coronavirus pandemic) based on the article above. Discuss any personal experience you have had working in the healthcare industry during this time; please be sure to observe all HIPAA laws regarding patient identifiers or your specific facility name.

In: Nursing

9) Congratulations, you have graduated and scored a job at one of the Charleston area’s largest...

9) Congratulations, you have graduated and scored a job at one of the Charleston area’s largest consulting firms. You have just finished typical first day stuff (choosing your screensaver, arranging your cubicle, etc) when your new supervisor walks in. “Listen –new person, I have to go to a company shareholders pat ourselves on the back meeting this afternoon that just came up three months ago. I scheduled a meeting with a new client today and you need to brief the client on what regulations apply to their site. They own a large industrial/agricultural facility on a few hundred acres. They want to redevelop part of it and keep part of it operating as is; part has existing contamination; part has new chemical and biotechnology operations; part has day to day operations that result in hazardous as well as municipal solid waste. You need to brief them on what three (3) major federal regulations apply to their site and what those regulations mean. Youalso need to let them know specifically which regulations apply to their different on site problems and operations–here is a list of those operations or problems.” Thedescriptions of the specific regulations need to be very detailed.

The list: •Developing a genetically engineered strain of soybeans to resist cold and draught

•Groundwater contamination on a closed parcel of land from TCE contamination in 1945

•Soil contamination from 1980 –all carcinogens –wants to redevelop the site for new use

•Solid waste from the buildings, machine shop, and motor pool

•Hazardous waste (generated daily) from three ethylene crackers

•Low level hazardous waste from two ammonia production facilities

•Final research and development of a novel agricultural pesticide that willlikely hit the market next year•Production of a new food additive/preservative

•Production of a new cosmeticoThe company also wants to know under what act they can be fined if their production disposal practices and storage practices are not appropriate

In: Civil Engineering

Prompt. In the last few weeks, the Federal Reserve has introduced a series of unconventional monetary...

Prompt. In the last few weeks, the Federal Reserve has introduced a series of unconventional monetary policy tools—lending facilities, essentially, designed to ease credit strains that firms and municipalities will likely experience as the U.S. economy is buffeted by the novel coronavirus pandemic. The “Fed Brief” that accompanies this prompt outlines these new unconventional tools. Section 13(3) of the Federal Reserve Act grants the central bank the authority, with the approval of the Secretary of the Treasury, to implement these tools in emergency situations—what the Act identifies as “unusual and exigent” circumstances.
The governors of the Federal Reserve reason that these unconventional actions are in the best interest of the economy. Nevertheless, the governors are concerned that these actions, which have attracted the attention of journalists, politicians, and pundits alike, could ultimately politicize the Federal Reserve and, in doing so, compromise its ability to achieve its long-run monetary policy goals. Consider, for example, the recent Wall Street Journal article, by renowned financial journalist Greg Ip, that accompanies this prompt. Thus, the governors—Michelle Bowman, Lael Brainard, Richard Clarida, Jerome Powell, and Randal Quarles—ask you to assess how the central bank’s recent unconventional actions might affect its monetary policy outcomes in the long run. Specifically, the governors ask you to answer the following three questions.


1. In general, would the politicization of the central bank render monetary policy more or less time consistent? Please defend your reasoning.

2. Central banks endeavor to maintain time-consistent monetary policies, because time-inconsistent monetary policies tend to deliver unwanted inflation outcomes in the long run; why do time-inconsistent monetary policies underperform in this way?

3. Finally, provide an example of how the Federal Reserve and, perhaps, Congress could preserve (or, if necessary, restore) the credibility of the central bank’s commitment to maintain low and stable inflation. Again, please defend your reasoning.

In: Economics

1. One of the biggest news stories of the past few months is the outbreak of...

1. One of the biggest news stories of the past few months is the outbreak of COVID-19 (novel coronavirus), first in China and then throughout the world. Numerous pharmaceutical companies have begun to develop COVID-19 vaccines. If all goes well, it will be at least a year before a vaccine is developed, tested, and approved by the FDA. However, one company—Moderna Therapeutics—has beaten all of the other companies in the race so far and is the first to advance to Phase 1 clinical trials.

Suppose that Moderna is the first company to gain approval for a COVID-19 vaccine in the United States. The monthly demand for COVID-19 vaccines in the U.S. is Q = 16 – (P/6) where Q is measured in millions of vials and P is measured in dollars. Moderna’s total cost of producing Q vials of vaccine is 2Q2 and Moderna’s marginal cost is 4Q.

1.A As the only company allowed to sell COVID-19 vaccines in the U.S., what price would Moderna charge for its vaccine to maximize profit? How many vials of vaccine would Moderna sell each month? What are Moderna’s monthly profits from the sale of COVID-19 vaccine?

1.B How many vials of vaccine would be produced and what price per vial would be charged if this were a perfectly competitive market?

1.C (Vaccines, like the COVID-19 vaccine being developed by Moderna, provide benefits beyond the benefits received by those vaccinated. For instance, as more people are vaccinated, the odds of disease transmission to vulnerable groups who cannot be vaccinated (e.g., infants) are reduced. Suppose the marginal social benefit of the COVID-19 vaccine is 110 – 6Q, which is greater than the marginal private benefit. Given this, what role do you think the federal government should play in vaccine development, if any, beyond the determination of safety and effectiveness associated with vaccine approval?

In: Economics

Engineering Ethics Course Codes of Ethics Assignment Review the Intel Pentium Chip case (Case below) and...

Engineering Ethics Course

Codes of Ethics Assignment


Review the Intel Pentium Chip case (Case below) and answer following questions:


1. Which statements in IEEE’s code of ethics do you believe Intel violated in this case? For each statement you select, justify your selection with an explanation.


2. Given that Intel perceived that the chip flaw was insignificant, and that flaws are likely to occur in early versions of a chip, what approach do you think Intel should have followed as they put the chips on sale?

The Intel Pentium® Chip Case

In late 1994, the media began to report that there was a flaw in the new Pentium microprocessor produced by Intel. The microprocessor is the heart of a personal computer and controls all of the operations and calculations that take place. A flaw in the Pentium was especially significant, since it was the microprocessor used in 80% of the personal computers produced in the world at that time.

Apparently, flaws in a complicated integrated circuit such as the Pentium, which at the time contained over one million transistors, are common. However, most of the flaws are undetectable by the user and don’t affect the operation of the computer. Many of these flaws are easily compensated for through software. The flaw that came to light in 1994 was different: It was detectable by the user. This particular flaw was in the floating-point unit (FPU) and caused a wrong answer when double-precision arithmetic, a very common operation, was performed.

A standard test was widely published to determine whether a user’s microprocessor was flawed. Using spreadsheet software, the user was to take the number 4,195,835, multiply it by 3,145,727, and then divide that result by 3,145,727. As we all know from elementary math, when a number is multiplied and then divided by the same number, the result should be the original number. In this example, the result should be 4,195,835. However, with the flawed FPU, the result of this calculation was 4,195,579 [Infoworld, 1994]. Depending on the application, this six-thousandths-of-a-percent error might be very significant.

At first, Intel’s response to these reports was to deny that there was any problem with the chip. When it became clear that this assertion was not accurate, Intel switched its policy and stated that although there was indeed a defect in the chip, it was insignificant and the vast majority of users would never even notice it. The chip would be replaced for free only for users who could demonstrate that they needed an unflawed version of the chip [Infoworld, 1994]. There is some logic to this policy from Intel’s point of view, since over two million computers had already been sold with the defective chip.

Of course, this approach didn’t satisfy most Pentium owners. After all, how can you predict whether you will have a future application where this flaw might be significant? IBM, a major Pentium user, canceled the sales of all IBM computers containing the flawed chip. Finally, after much negative publicity in the popular personal computer literature and an outcry from Pentium users, Intel agreed to replace the flawed chip with an unflawed version for any customer who asked to have it replaced.

It should be noted that long before news of the flaw surfaced in the popular press, Intel was aware of the problem and had already corrected it on subsequent versions. It did, however, continue to sell the flawed version and, based on its early insistence that the flaw did not present a significant problem to users, seemingly planned to do so until the new version was available and the stocks of the flawed one were exhausted. Eventually, the damage caused by this case was fixed as the media reports of the problem died down and as customers were able to get unflawed chips into their computers. Ultimately, Intel had a write-off of 475 million dollars to solve this problem.

What did Intel learn from this experience? The early designs for new chips continue to have flaws, and sometimes these flaws are not detected until the product is already in use by consumers. However, Intel’s approach to these problems has changed. It now seems to feel that problems need to be fixed immediately. In addition, the decision is now based on the consumer’s perception of the significance of the flaw, rather than on Intel’s opinion of its significance.

Indeed, similar flaws were found in 1997 in the early versions of the Pentium II and Pentium Pro processors. This time, Intel immediately confirmed that the flaw existed and offered customers software that would correct it. Other companies also seem to have benefited from Intel’s experience. For example, Intuit, a leading manufacturer of tax preparation and financial software, called a news conference in March of 1995 to apologize for flaws in its TurboTax software that had become apparent earlier in that year. In addition to the apology, they offered consumers replacements for the defective software.

In: Electrical Engineering

observation_date FEDFUNDS 1954-07-01 0.80 1954-08-01 1.22 1954-09-01 1.06 1954-10-01 0.85 1954-11-01 0.83 1954-12-01 1.28 1955-01-01 1.39...

observation_date FEDFUNDS
1954-07-01 0.80
1954-08-01 1.22
1954-09-01 1.06
1954-10-01 0.85
1954-11-01 0.83
1954-12-01 1.28
1955-01-01 1.39
1955-02-01 1.29
1955-03-01 1.35
1955-04-01 1.43
1955-05-01 1.43
1955-06-01 1.64
1955-07-01 1.68
1955-08-01 1.96
1955-09-01 2.18
1955-10-01 2.24
1955-11-01 2.35
1955-12-01 2.48
1956-01-01 2.45
1956-02-01 2.50
1956-03-01 2.50
1956-04-01 2.62
1956-05-01 2.75
1956-06-01 2.71
1956-07-01 2.75
1956-08-01 2.73
1956-09-01 2.95
1956-10-01 2.96
1956-11-01 2.88
1956-12-01 2.94
1957-01-01 2.84
1957-02-01 3.00
1957-03-01 2.96
1957-04-01 3.00
1957-05-01 3.00
1957-06-01 3.00
1957-07-01 2.99
1957-08-01 3.24
1957-09-01 3.47
1957-10-01 3.50
1957-11-01 3.28
1957-12-01 2.98
1958-01-01 2.72
1958-02-01 1.67
1958-03-01 1.20
1958-04-01 1.26
1958-05-01 0.63
1958-06-01 0.93
1958-07-01 0.68
1958-08-01 1.53
1958-09-01 1.76
1958-10-01 1.80
1958-11-01 2.27
1958-12-01 2.42
1959-01-01 2.48
1959-02-01 2.43
1959-03-01 2.80
1959-04-01 2.96
1959-05-01 2.90
1959-06-01 3.39
1959-07-01 3.47
1959-08-01 3.50
1959-09-01 3.76
1959-10-01 3.98
1959-11-01 4.00
1959-12-01 3.99
1960-01-01 3.99
1960-02-01 3.97
1960-03-01 3.84
1960-04-01 3.92
1960-05-01 3.85
1960-06-01 3.32
1960-07-01 3.23
1960-08-01 2.98
1960-09-01 2.60
1960-10-01 2.47
1960-11-01 2.44
1960-12-01 1.98
1961-01-01 1.45
1961-02-01 2.54
1961-03-01 2.02
1961-04-01 1.49
1961-05-01 1.98
1961-06-01 1.73
1961-07-01 1.17
1961-08-01 2.00
1961-09-01 1.88
1961-10-01 2.26
1961-11-01 2.61
1961-12-01 2.33
1962-01-01 2.15
1962-02-01 2.37
1962-03-01 2.85
1962-04-01 2.78
1962-05-01 2.36
1962-06-01 2.68
1962-07-01 2.71
1962-08-01 2.93
1962-09-01 2.90
1962-10-01 2.90
1962-11-01 2.94
1962-12-01 2.93
1963-01-01 2.92
1963-02-01 3.00
1963-03-01 2.98
1963-04-01 2.90
1963-05-01 3.00
1963-06-01 2.99
1963-07-01 3.02
1963-08-01 3.49
1963-09-01 3.48
1963-10-01 3.50
1963-11-01 3.48
1963-12-01 3.38
1964-01-01 3.48
1964-02-01 3.48
1964-03-01 3.43
1964-04-01 3.47
1964-05-01 3.50
1964-06-01 3.50
1964-07-01 3.42
1964-08-01 3.50
1964-09-01 3.45
1964-10-01 3.36
1964-11-01 3.52
1964-12-01 3.85
1965-01-01 3.90
1965-02-01 3.98
1965-03-01 4.04
1965-04-01 4.09
1965-05-01 4.10
1965-06-01 4.04
1965-07-01 4.09
1965-08-01 4.12
1965-09-01 4.01
1965-10-01 4.08
1965-11-01 4.10
1965-12-01 4.32
1966-01-01 4.42
1966-02-01 4.60
1966-03-01 4.65
1966-04-01 4.67
1966-05-01 4.90
1966-06-01 5.17
1966-07-01 5.30
1966-08-01 5.53
1966-09-01 5.40
1966-10-01 5.53
1966-11-01 5.76
1966-12-01 5.40
1967-01-01 4.94
1967-02-01 5.00
1967-03-01 4.53
1967-04-01 4.05
1967-05-01 3.94
1967-06-01 3.98
1967-07-01 3.79
1967-08-01 3.90
1967-09-01 3.99
1967-10-01 3.88
1967-11-01 4.13
1967-12-01 4.51
1968-01-01 4.60
1968-02-01 4.71
1968-03-01 5.05
1968-04-01 5.76
1968-05-01 6.11
1968-06-01 6.07
1968-07-01 6.02
1968-08-01 6.03
1968-09-01 5.78
1968-10-01 5.91
1968-11-01 5.82
1968-12-01 6.02
1969-01-01 6.30
1969-02-01 6.61
1969-03-01 6.79
1969-04-01 7.41
1969-05-01 8.67
1969-06-01 8.90
1969-07-01 8.61
1969-08-01 9.19
1969-09-01 9.15
1969-10-01 9.00
1969-11-01 8.85
1969-12-01 8.97
1970-01-01 8.98
1970-02-01 8.98
1970-03-01 7.76
1970-04-01 8.10
1970-05-01 7.94
1970-06-01 7.60
1970-07-01 7.21
1970-08-01 6.61
1970-09-01 6.29
1970-10-01 6.20
1970-11-01 5.60
1970-12-01 4.90
1971-01-01 4.14
1971-02-01 3.72
1971-03-01 3.71
1971-04-01 4.15
1971-05-01 4.63
1971-06-01 4.91
1971-07-01 5.31
1971-08-01 5.56
1971-09-01 5.55
1971-10-01 5.20
1971-11-01 4.91
1971-12-01 4.14
1972-01-01 3.50
1972-02-01 3.29
1972-03-01 3.83
1972-04-01 4.17
1972-05-01 4.27
1972-06-01 4.46
1972-07-01 4.55
1972-08-01 4.80
1972-09-01 4.87
1972-10-01 5.04
1972-11-01 5.06
1972-12-01 5.33
1973-01-01 5.94
1973-02-01 6.58
1973-03-01 7.09
1973-04-01 7.12
1973-05-01 7.84
1973-06-01 8.49
1973-07-01 10.40
1973-08-01 10.50
1973-09-01 10.78
1973-10-01 10.01
1973-11-01 10.03
1973-12-01 9.95
1974-01-01 9.65
1974-02-01 8.97
1974-03-01 9.35
1974-04-01 10.51
1974-05-01 11.31
1974-06-01 11.93
1974-07-01 12.92
1974-08-01 12.01
1974-09-01 11.34
1974-10-01 10.06
1974-11-01 9.45
1974-12-01 8.53
1975-01-01 7.13
1975-02-01 6.24
1975-03-01 5.54
1975-04-01 5.49
1975-05-01 5.22
1975-06-01 5.55
1975-07-01 6.10
1975-08-01 6.14
1975-09-01 6.24
1975-10-01 5.82
1975-11-01 5.22
1975-12-01 5.20
1976-01-01 4.87
1976-02-01 4.77
1976-03-01 4.84
1976-04-01 4.82
1976-05-01 5.29
1976-06-01 5.48
1976-07-01 5.31
1976-08-01 5.29
1976-09-01 5.25
1976-10-01 5.02
1976-11-01 4.95
1976-12-01 4.65
1977-01-01 4.61
1977-02-01 4.68
1977-03-01 4.69
1977-04-01 4.73
1977-05-01 5.35
1977-06-01 5.39
1977-07-01 5.42
1977-08-01 5.90
1977-09-01 6.14
1977-10-01 6.47
1977-11-01 6.51
1977-12-01 6.56
1978-01-01 6.70
1978-02-01 6.78
1978-03-01 6.79
1978-04-01 6.89
1978-05-01 7.36
1978-06-01 7.60
1978-07-01 7.81
1978-08-01 8.04
1978-09-01 8.45
1978-10-01 8.96
1978-11-01 9.76
1978-12-01 10.03
1979-01-01 10.07
1979-02-01 10.06
1979-03-01 10.09
1979-04-01 10.01
1979-05-01 10.24
1979-06-01 10.29
1979-07-01 10.47
1979-08-01 10.94
1979-09-01 11.43
1979-10-01 13.77
1979-11-01 13.18
1979-12-01 13.78
1980-01-01 13.82
1980-02-01 14.13
1980-03-01 17.19
1980-04-01 17.61
1980-05-01 10.98
1980-06-01 9.47
1980-07-01 9.03
1980-08-01 9.61
1980-09-01 10.87
1980-10-01 12.81
1980-11-01 15.85
1980-12-01 18.90
1981-01-01 19.08
1981-02-01 15.93
1981-03-01 14.70
1981-04-01 15.72
1981-05-01 18.52
1981-06-01 19.10
1981-07-01 19.04
1981-08-01 17.82
1981-09-01 15.87
1981-10-01 15.08
1981-11-01 13.31
1981-12-01 12.37
1982-01-01 13.22
1982-02-01 14.78
1982-03-01 14.68
1982-04-01 14.94
1982-05-01 14.45
1982-06-01 14.15
1982-07-01 12.59
1982-08-01 10.12
1982-09-01 10.31
1982-10-01 9.71
1982-11-01 9.20
1982-12-01 8.95
1983-01-01 8.68
1983-02-01 8.51
1983-03-01 8.77
1983-04-01 8.80
1983-05-01 8.63
1983-06-01 8.98
1983-07-01 9.37
1983-08-01 9.56
1983-09-01 9.45
1983-10-01 9.48
1983-11-01 9.34
1983-12-01 9.47
1984-01-01 9.56
1984-02-01 9.59
1984-03-01 9.91
1984-04-01 10.29
1984-05-01 10.32
1984-06-01 11.06
1984-07-01 11.23
1984-08-01 11.64
1984-09-01 11.30
1984-10-01 9.99
1984-11-01 9.43
1984-12-01 8.38
1985-01-01 8.35
1985-02-01 8.50
1985-03-01 8.58
1985-04-01 8.27
1985-05-01 7.97
1985-06-01 7.53
1985-07-01 7.88
1985-08-01 7.90
1985-09-01 7.92
1985-10-01 7.99
1985-11-01 8.05
1985-12-01 8.27
1986-01-01 8.14
1986-02-01 7.86
1986-03-01 7.48
1986-04-01 6.99
1986-05-01 6.85
1986-06-01 6.92
1986-07-01 6.56
1986-08-01 6.17
1986-09-01 5.89
1986-10-01 5.85
1986-11-01 6.04
1986-12-01 6.91
1987-01-01 6.43
1987-02-01 6.10
1987-03-01 6.13
1987-04-01 6.37
1987-05-01 6.85
1987-06-01 6.73
1987-07-01 6.58
1987-08-01 6.73
1987-09-01 7.22
1987-10-01 7.29
1987-11-01 6.69
1987-12-01 6.77
1988-01-01 6.83
1988-02-01 6.58
1988-03-01 6.58
1988-04-01 6.87
1988-05-01 7.09
1988-06-01 7.51
1988-07-01 7.75
1988-08-01 8.01
1988-09-01 8.19
1988-10-01 8.30
1988-11-01 8.35
1988-12-01 8.76
1989-01-01 9.12
1989-02-01 9.36
1989-03-01 9.85
1989-04-01 9.84
1989-05-01 9.81
1989-06-01 9.53
1989-07-01 9.24
1989-08-01 8.99
1989-09-01 9.02
1989-10-01 8.84
1989-11-01 8.55
1989-12-01 8.45
1990-01-01 8.23
1990-02-01 8.24
1990-03-01 8.28
1990-04-01 8.26
1990-05-01 8.18
1990-06-01 8.29
1990-07-01 8.15
1990-08-01 8.13
1990-09-01 8.20
1990-10-01 8.11
1990-11-01 7.81
1990-12-01 7.31
1991-01-01 6.91
1991-02-01 6.25
1991-03-01 6.12
1991-04-01 5.91
1991-05-01 5.78
1991-06-01 5.90
1991-07-01 5.82
1991-08-01 5.66
1991-09-01 5.45
1991-10-01 5.21
1991-11-01 4.81
1991-12-01 4.43
1992-01-01 4.03
1992-02-01 4.06
1992-03-01 3.98
1992-04-01 3.73
1992-05-01 3.82
1992-06-01 3.76
1992-07-01 3.25
1992-08-01 3.30
1992-09-01 3.22
1992-10-01 3.10
1992-11-01 3.09
1992-12-01 2.92
1993-01-01 3.02
1993-02-01 3.03
1993-03-01 3.07
1993-04-01 2.96
1993-05-01 3.00
1993-06-01 3.04
1993-07-01 3.06
1993-08-01 3.03
1993-09-01 3.09
1993-10-01 2.99
1993-11-01 3.02
1993-12-01 2.96
1994-01-01 3.05
1994-02-01 3.25
1994-03-01 3.34
1994-04-01 3.56
1994-05-01 4.01
1994-06-01 4.25
1994-07-01 4.26
1994-08-01 4.47
1994-09-01 4.73
1994-10-01 4.76
1994-11-01 5.29
1994-12-01 5.45
1995-01-01 5.53
1995-02-01 5.92
1995-03-01 5.98
1995-04-01 6.05
1995-05-01 6.01
1995-06-01 6.00
1995-07-01 5.85
1995-08-01 5.74
1995-09-01 5.80
1995-10-01 5.76
1995-11-01 5.80
1995-12-01 5.60
1996-01-01 5.56
1996-02-01 5.22
1996-03-01 5.31
1996-04-01 5.22
1996-05-01 5.24
1996-06-01 5.27
1996-07-01 5.40
1996-08-01 5.22
1996-09-01 5.30
1996-10-01 5.24
1996-11-01 5.31
1996-12-01 5.29
1997-01-01 5.25
1997-02-01 5.19
1997-03-01 5.39
1997-04-01 5.51
1997-05-01 5.50
1997-06-01 5.56
1997-07-01 5.52
1997-08-01 5.54
1997-09-01 5.54
1997-10-01 5.50
1997-11-01 5.52
1997-12-01 5.50
1998-01-01 5.56
1998-02-01 5.51
1998-03-01 5.49
1998-04-01 5.45
1998-05-01 5.49
1998-06-01 5.56
1998-07-01 5.54
1998-08-01 5.55
1998-09-01 5.51
1998-10-01 5.07
1998-11-01 4.83
1998-12-01 4.68
1999-01-01 4.63
1999-02-01 4.76
1999-03-01 4.81
1999-04-01 4.74
1999-05-01 4.74
1999-06-01 4.76
1999-07-01 4.99
1999-08-01 5.07
1999-09-01 5.22
1999-10-01 5.20
1999-11-01 5.42
1999-12-01 5.30
2000-01-01 5.45
2000-02-01 5.73
2000-03-01 5.85
2000-04-01 6.02
2000-05-01 6.27
2000-06-01 6.53
2000-07-01 6.54
2000-08-01 6.50
2000-09-01 6.52
2000-10-01 6.51
2000-11-01 6.51
2000-12-01 6.40
2001-01-01 5.98
2001-02-01 5.49
2001-03-01 5.31
2001-04-01 4.80
2001-05-01 4.21
2001-06-01 3.97
2001-07-01 3.77
2001-08-01 3.65
2001-09-01 3.07
2001-10-01 2.49
2001-11-01 2.09
2001-12-01 1.82
2002-01-01 1.73
2002-02-01 1.74
2002-03-01 1.73
2002-04-01 1.75
2002-05-01 1.75
2002-06-01 1.75
2002-07-01 1.73
2002-08-01 1.74
2002-09-01 1.75
2002-10-01 1.75
2002-11-01 1.34
2002-12-01 1.24
2003-01-01 1.24
2003-02-01 1.26
2003-03-01 1.25
2003-04-01 1.26
2003-05-01 1.26
2003-06-01 1.22
2003-07-01 1.01
2003-08-01 1.03
2003-09-01 1.01
2003-10-01 1.01
2003-11-01 1.00
2003-12-01 0.98
2004-01-01 1.00
2004-02-01 1.01
2004-03-01 1.00
2004-04-01 1.00
2004-05-01 1.00
2004-06-01 1.03
2004-07-01 1.26
2004-08-01 1.43
2004-09-01 1.61
2004-10-01 1.76
2004-11-01 1.93
2004-12-01 2.16
2005-01-01 2.28
2005-02-01 2.50
2005-03-01 2.63
2005-04-01 2.79
2005-05-01 3.00
2005-06-01 3.04
2005-07-01 3.26
2005-08-01 3.50
2005-09-01 3.62
2005-10-01 3.78
2005-11-01 4.00
2005-12-01 4.16
2006-01-01 4.29
2006-02-01 4.49
2006-03-01 4.59
2006-04-01 4.79
2006-05-01 4.94
2006-06-01 4.99
2006-07-01 5.24
2006-08-01 5.25
2006-09-01 5.25
2006-10-01 5.25
2006-11-01 5.25
2006-12-01 5.24
2007-01-01 5.25
2007-02-01 5.26
2007-03-01 5.26
2007-04-01 5.25
2007-05-01 5.25
2007-06-01 5.25
2007-07-01 5.26
2007-08-01 5.02
2007-09-01 4.94
2007-10-01 4.76
2007-11-01 4.49
2007-12-01 4.24
2008-01-01 3.94
2008-02-01 2.98
2008-03-01 2.61
2008-04-01 2.28
2008-05-01 1.98
2008-06-01 2.00
2008-07-01 2.01
2008-08-01 2.00
2008-09-01 1.81
2008-10-01 0.97
2008-11-01 0.39
2008-12-01 0.16
2009-01-01 0.15
2009-02-01 0.22
2009-03-01 0.18
2009-04-01 0.15
2009-05-01 0.18
2009-06-01 0.21
2009-07-01 0.16
2009-08-01 0.16
2009-09-01 0.15
2009-10-01 0.12
2009-11-01 0.12
2009-12-01 0.12
2010-01-01 0.11
2010-02-01 0.13
2010-03-01 0.16
2010-04-01 0.20
2010-05-01 0.20
2010-06-01 0.18
2010-07-01 0.18
2010-08-01 0.19
2010-09-01 0.19
2010-10-01 0.19
2010-11-01 0.19
2010-12-01 0.18
2011-01-01 0.17
2011-02-01 0.16
2011-03-01 0.14
2011-04-01 0.10
2011-05-01 0.09
2011-06-01 0.09
2011-07-01 0.07
2011-08-01 0.10
2011-09-01 0.08
2011-10-01 0.07
2011-11-01 0.08
2011-12-01 0.07
2012-01-01 0.08
2012-02-01 0.10
2012-03-01 0.13
2012-04-01 0.14
2012-05-01 0.16
2012-06-01 0.16
2012-07-01 0.16
2012-08-01 0.13
2012-09-01 0.14
2012-10-01 0.16
2012-11-01 0.16
2012-12-01 0.16
2013-01-01 0.14
2013-02-01 0.15
2013-03-01 0.14
2013-04-01 0.15
2013-05-01 0.11
2013-06-01 0.09
2013-07-01 0.09
2013-08-01 0.08
2013-09-01 0.08
2013-10-01 0.09
2013-11-01 0.08
2013-12-01 0.09
2014-01-01 0.07
2014-02-01 0.07
2014-03-01 0.08
2014-04-01 0.09
2014-05-01 0.09
2014-06-01 0.10
2014-07-01 0.09
2014-08-01 0.09
2014-09-01 0.09
2014-10-01 0.09
2014-11-01 0.09
2014-12-01 0.12
2015-01-01 0.11
2015-02-01 0.11
2015-03-01 0.11
2015-04-01 0.12
2015-05-01 0.12

Using the data in the Federal Funds Rate tab in the data file, perform the following analysese.

a) Create a new column in the data file with the 5 period moving average series of the Federal Funds rate.

b) Create a new column in the data file with the expontential smoothing series with W=0.25.

c) Plot the three columns against the date.

d) Fit an Autoregressive model to this data, assume that the true model has only one lag in it.

In: Statistics and Probability