Carrie Ann thinks she has identified a hot opportunity. She has watched the demand for tattoos and body art increase over the last several years. Carrie Ann believes that this trend is now leveling off and that in the near future many people who have gotten tattoos will want them removed. In anticipation, she has developed a nonsurgical approach to tattoo removal that consists of a cream applied to the tattoo. The area is then covered with gauze, and the cream must be reapplied every day for two weeks. At the end of two weeks, the tattoo is gone. A tube of Carrie Ann's cream will retail for about $50.
Carrie Ann's business could become a fast-growth player as described in this chapter. What would she need to do to become a fast-growth company?
In: Accounting
To what extent do syntax textbooks, which analyze the structure of sentences, illustrate gender bias? A study of this question sampled sentences from 10 texts. One part of the study examined the use of the words "girl," "boy," "man," and "woman." We will call the first two words juvenile and the last two adult. Is the proportion of female references that are juvenile (girl) equal to the proportion of male references that are juvenile (boy)? Here are data from one of the texts:
| Gender | n | X(juvenile) |
| Female | 57 | 49 |
| Male | 132 | 53 |
1) Give a 90% confidence interval for the difference. (Do not use rounded values. Round your final answers to three decimal places.)
=( , )
2) Use a test of significance to examine whether the two proportions are equal. (Use p̂F − p̂M. Round your value for z to two decimal places and round your P-value to four decimal places.)
A) z=
B)P-Value=
In: Statistics and Probability
Consider the various categories of ethics from the module content; Internet Ethics, Cyber Ethics, E-Commerce Ethics, Web Ethics, Business Computer Ethics, and Consumer Computer Ethics.
For this assignment, you will submit your best two scenarios from two separate categories that you devised. Be sure to reference ethical guidelines you learned from the module content and clearly identify the ethical dilemma(s) and/or violation(s).
Minimum requirements:
In: Computer Science
The invasive diatom species Didymosphenia geminata has the potential to inflict substantial ecological and economic damage in rivers. An article described an investigation of colonization behavior. One aspect of particular interest was whether
y = colony
density was related to
x = rock
surface area. The article contained a scatterplot and summary of a regression analysis. Here is representative data.
| x | 50 | 71 | 55 | 50 | 33 | 58 | 79 | 26 |
| y | 161 | 1938 | 57 | 31 | 11 | 14 | 44 | 16 |
| x | 69 | 44 | 37 | 70 | 20 | 45 | 49 |
| y | 278 | 47 | 180 | 22 | 52 | 194 | 34 |
(a) Fit the simple linear regression model to this data. (Round
your numerical values to three decimal places.)
y =
Predict colony density when surface area = 70 and calculate the
corresponding residual. (Round your answers to the nearest whole
number.)
| colony density | |
| corresponding residual |
Predict colony density when surface area = 71 and calculate the
corresponding residual. (Round your answers to the nearest whole
number.)
| colony density | |
| corresponding residual |
How do the residuals compare?
The residuals for both points are negative.The residual for the first point is negative, while the residual for the second point is positive. The residual for the first point is positive, while the residual for the second point is negative.The residuals for both points are positive.
(b) Calculate the coefficient of determination. (Round your answer
to three decimal places.)
Interpret the coefficient of determination.
The coefficient of determination is the increase in colony density due to an increase in one unit of colony density.The coefficient of determination is the probability that the regression model fits the data. The coefficient of determination is the increase in rock surface area due to an increase in one unit of rock surface area.The coefficient of determination is the proportion of the total variation in colony density that can be explained by a linear regression model with rock surface area as the predictor.The coefficient of determination is the proportion of the total variation in rock surface area that can be explained by a linear regression model with colony density as the predictor.
(c) The second observation has a very extreme y value (in
the full data set consisting of 72 observations, there were two of
these). This observation may have had a substantial impact on the
fit of the model and subsequent conclusions. Eliminate it and
recalculate the equation of the estimated regression line. (Round
your values to three decimal places.)
y =
In: Statistics and Probability
Test the practical legality of the subnets defined below by attempting to make route destinations out of them with the Linux "route" command. The route command will accept those that are legal, and create an error (with a screen showing route's syntax) for those that are illegal. Here are the subnets for you to test:
network address/netmask
1) 209.220.186.96/255.255.255.224
2) 209.220.186.96/255.255.255.192
3) 209.220.186.240/255.255.255.240
4) 209.220.186.240/255.255.255.224
5) 209.220.186.128/255.255.255.192
6) 209.220.186.128/255.255.255.64
7) 209.220.16.80/255.255.255.240
8) 209.220.186.64/255.255.255.192
You would test each one by specifying both its network address and netmask in the route command. So for the first example you would issue the command:
route add -net 209.220.186.96 netmask 255.255.255.224 eth0
in order to see whether the command "takes" or not. If it does, the routing table will show the new route. (Before doing this make sure eth0 has an address assigned to it. Assign one by issuing the command "ifconfig eth0 192.168.3.1".) You can view the routing table by issuing the command:
route -n
(If at any point you wish to remove a route you have entered into the table, issue the exact same command you used to enter it with add replaced by del." For example:
route del -net 209.220.186.96 netmask 255.255.255.224 eth0
removes the line added above to the routing table. You can reproduce on the command line a previously issued command by successively pressing the up-arrow key, which operates in Linux the same way as with the doskey program in DOS.)
For every subnet definition you are to provide three answers. First, telling whether the route command succeeded or failed. Second, an explanation for failure. Third, a number giving the size of the subnet your route command is trying to create (which is expressed by its netmask).
Finally, for subnets 7 and 8, look closely at them and the relationship between them. (For clarity of understanding I suggest for these, and for all of them, that you draw a linear diagram locating and sizing the subnet on an address number line.) You should perceive what might appear to be a conflict between them. Identify in your own mind the apparent conflict and try to explain the observed result in relation to it. Be prepared to offer an explanation in class (this question not to be included in the answer file you'll submit).
1. The route command for network 1
a. succeeded
b. failed
2. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
3. The size of the subnet your route command is implicitly
trying to create for network 1, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
---
4. The route command for network 2
a. succeeded
b. failed
5. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
6. The size of the subnet your route command is implicitly
trying to create for network 2, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
---
7. The route command for network 3
a. succeeded
b. failed
8. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
9. The size of the subnet your route command is implicitly
trying to create for network 3, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
---
10. The route command for network 4
a. succeeded
b. failed
11. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
12. The size of the subnet your route command is implicitly
trying to create for network 4, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
---
13. The route command for network 5
a. succeeded
b. failed
14. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
15. The size of the subnet your route command is implicitly
trying to create for network 5, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
---
16. The route command for network 6
a. succeeded
b. failed
17. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
18. The size of the subnet your route command is implicitly
trying to create for network 6, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
---
19. The route command for network 7
a. succeeded
b. failed
20. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
21. The size of the subnet your route command is implicitly
trying to create for network 7, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
---
22. The route command for network 8
a. succeeded
b. failed
23. Why did it fail?
a. I just told you, it didn't fail!
b. because the network address isn't a multiple of the
netmask-indicated network size
c. because the network address final octet isn't a power of
two
d. because the netmask-indicated size isn't a multiple of the
network address
e. because the netmask given isn't a legal one
f. because the network address given isn't a legal one
24. The size of the subnet your route command is implicitly
trying to create for network 8, based on the command's netmask,
is
a. 4
b. 8
c. 16
d. 32
e. 64
f. 128
g. 256
h. undetermined
In: Computer Science
Last week you computed an ANOVA on the response of the rare yellow octopus to clam flavor. If you did the analysis correctly you found a significant effect of clam juice concentration (“odor”) on the speed with which the Octopuses found the source of the odor. Now complete the analysis by conducting a post-hoc analysis on the data-set OCTOPUS.csv. Use and -level of 0.01 (because you want to avoid excessive type 1 error). Because this is an exploratory experiment, choose the post-hoc test that maintains comparison-wise error. Explain, in terms of this experiment, why you choose the particular Post-Hoc test you did. Paste your R output below. Which groups are different from the others? When you do this explain the differences in English sentences AND remember to report your Q-statistics in the proper statistical reporting format.
| ClamDose | TimeTake |
| 0 | 6 |
| 0 | 4 |
| 0 | 7 |
| 0 | 6 |
| 0 | 5 |
| 0 | 5 |
| 0 | 5 |
| 0 | 6 |
| 0 | 6 |
| 0 | 5 |
| 1 | 5 |
| 1 | 6 |
| 1 | 7 |
| 1 | 7 |
| 1 | 7 |
| 1 | 8 |
| 1 | 5 |
| 1 | 7 |
| 1 | 6 |
| 1 | 7 |
| 5 | 7 |
| 5 | 8 |
| 5 | 8 |
| 5 | 6 |
| 5 | 9 |
| 5 | 7 |
| 5 | 7 |
| 5 | 7 |
| 5 | 8 |
| 5 | 6 |
| 10 | 7 |
| 10 | 6 |
| 10 | 7 |
| 10 | 6 |
| 10 | 7 |
| 10 | 8 |
| 10 | 7 |
| 10 | 7 |
| 10 | 8 |
| 10 | 7 |
In: Statistics and Probability
In: Biology
A weekly time ticket for Joyce Caldwell
follows:
| Direct Labor Time Ticket | Dates: Monday 8/12 − Friday 8/16, 2016 | ||||
| Ticket Number: TT338 | |||||
| Employee: Joyce Caidwell | |||||
| Date | Time Started |
Time Ended |
Total Hours |
Job Number |
|
| 8/12/2016 | 7:00 AM | 3:00 PM | 8 hours | Job 271 | |
| 8/13/2016 | 7:00 AM | 3:00 PM | 8 hours | Job 271 | |
| 8/14/2016 | 7:00 AM | 3:00 PM | 8 hours | Job 272 | |
| 8/15/2016 | 7:00 AM | 11:00 AM | 4 hours | Job 272 | |
| 8/15/2016 | 12:00 PM | 4:00 PM | 4 hours | Maintenance | |
| 8/16/2016 | 7:00 AM | 3:00 PM | 8 hours | Job 273 | |
| Weekly Total | 40 hours | ||||
| Hourly Labor Rate | × $17 | ||||
| Total Wages Earned | $680 | ||||
Required:
Prepare a journal entry to record Joyce’s wages. (If no
entry is required for a transaction/event, select "No Journal Entry
Required" in the first account field.)
In: Math
16. The following data are from an experiment comparing two treatments:
|
Treatment 1 |
Treatment 2 |
|
10 |
11 |
|
2 |
5 |
|
1 |
2 |
|
15 |
18 |
|
7 |
9 |
|
M = 7 |
M = 9 |
|
SS = 134 |
SS = 150 |
Assume that the data are from a repeated-measures experiment using the same sample of n = 5 subjects in both treatments. Calculate the difference score (D) for each subject and use the sample of difference scores to determine whether there is a significant difference between the two treatments. Again, use a two-tailed test with a = .05.
For the repeated measures analysis you did, which of the following is TRUE:
a. the t you look up is on 8 degrees of freedom
b. the t you compute is LESS than 2.776
c. the treatment's effect is significant
d. the treatment's effect is non-significant
In: Statistics and Probability
A consulting company was tasked with identifying which market segment would be more profitable, labeled as Segment A or Segment B. A survey was created showing a product to the two different segments, and respondents were asked to rate the product on a scale from 1 to 10 (1 worst, 10 best). Run the correct test using α=0.10 . Which is the correct conclusion?
|
There is no statistically significant difference between Segments A and B. |
||
|
Cannot run this test, data not normal or not enough sample size. |
||
|
There is a statistically significant difference between Segments A and B. |
||
| Segment | Product Rating |
| A | 6 |
| A | 5 |
| A | 2 |
| A | 2 |
| A | 10 |
| A | 9 |
| A | 9 |
| A | 8 |
| A | 6 |
| A | 9 |
| A | 6 |
| A | 5 |
| A | 8 |
| A | 10 |
| A | 4 |
| A | 9 |
| A | 4 |
| A | 2 |
| A | 4 |
| A | 5 |
| A | 8 |
| A | 6 |
| A | 7 |
| A | 7 |
| A | 4 |
| A | 7 |
| A | 7 |
| A | 6 |
| A | 7 |
| A | 10 |
| B | 8 |
| B | 1 |
| B | 3 |
| B | 7 |
| B | 6 |
| B | 5 |
| B | 4 |
| B | 1 |
| B | 7 |
| B | 2 |
| B | 1 |
| B | 7 |
| B | 9 |
| B | 2 |
| B | 1 |
| B | 4 |
| B | 7 |
| B | 1 |
| B | 9 |
| B | 9 |
| B | 8 |
| B | 4 |
| B | 10 |
| B | 5 |
| B | 10 |
| B | 10 |
| B | 10 |
| B | 3 |
| B | 1 |
| B | 2 |
In: Statistics and Probability