Questions
Suppose that the following data represents ages of all tenured faculty members in a certain academic...

Suppose that the following data represents ages of all tenured faculty members in a certain academic department, and we want to numerically describe the age distribution for this department only:

42, 39, 44, 50, 45, 42, 36, 47, 39, 42, 43, 47

What is the 3rd quartile?

In: Statistics and Probability

Case Study: Shannon Shannon is a 30-year-old woman preparing to run her first marathon. She regularly...

Case Study: Shannon

Shannon is a 30-year-old woman preparing to run her first marathon. She regularly runs 30km per week, attends the gym three times per week doing a mix of cardio- and weight training sessions and also plays touch football once a week in a social work team. She is up early most mornings and when she does not run will either practice yoga at home or do a 30- to 40-minute power walk.

Shannon ran competitively throughout secondary school, eventually stopping after a series of stress fractures. At the time, she was particularly sensitive about her weight and body composition as she was serious about becoming an elite distance runner and her coach regularly made comment about achieving a low body fat content. He would also assess body composition every month during the season using a ‘pinch test’; a test Shannon particularly hated.

Shannon’s current diet:

BF: 2 Hi Bran (Sanitarium) breakfast biscuits with no-fat soy milk, sliced banana and 1 tbsp of processed bran. Glass of juice          

Lunch: Wholemeal lavash bread with hommus, 60 g of chopped chicken pieces, avocado and salad. Piece of fruit      

Dinner: Dahl with brown rice and large side salad   Handful of dried fruit, nut and seed mix.

Supper: Fresh fruit × 1–2 pieces. Warm mug of carob made on no-fat soy milk

With twelve weeks to go before the marathon, Shannon has joined a running group that effectively doubled her weekly training distance to around 85 km. She is married, works full-time as an environmental economist and has no children, although has been thinking about children in the not-too-distant future.

Shannon now reports losing 3 kg over the first six weeks of the running group attendance; however, she felt this was a great result as she had almost returned to her old running weight. However, she reports that she is feeling excessively fatigued, and found that although, initially she seemed to be running well within her new training group, she has begun to struggle to maintain pace during the long group runs. She has persisted with her weight and cardio-sessions, along with her morning walks but recently found that she started to miss sessions because she lacks energy.

  1. What suggestions would you make about Shannon's exercise program?

  2. What is the Female Athlete Triad and could this state be applied to Shannon?
  3. What dietary changes would you recommend for Shannon and why?

What do you need to consider when assessing the nutrient needs of an athlete?

In: Biology

IN C++ PLEASE Requirements Write a program that takes in user input of two integer numbers...

IN C++ PLEASE

Requirements

Write a program that takes in user input of two integer numbers for height and width and uses a nested for loop to make a rectangle out of asterixes. The creation of the rectangle (i.e. the nested for loop) should occur in a void function that takes in 2 parameters, one for height and one for width. Make sure your couts match the sample output (copy and paste from those couts so you don't make a simple error). The Pre and Post condition should be a comment above the prototype; it should specify invalid input (there is no requirement for output on invalid input and it is not tested).

Rubric

-void function prototype, pre post comment, and definition matching prototype, and function called correctly 3 pts

-user input prompted and input accepted 2 pts

-correct bounds on the nested for loop 2 pts

-correct output 3 pts

Sample output (output in bold, input in nonbold):

What height do you want your rectangle?

5

What width do you want your rectangle?

5

*****

*****

*****

*****

*****

What height do you want your rectangle?

3

What width do you want your rectangle?

10

**********

**********

**********

What height do you want your rectangle?

6

What width do you want your rectangle?

2

**

**

**

**

**

**

What height do you want your rectangle?

10

What width do you want your rectangle?

7

*******

*******

*******

*******

*******

*******

*******

*******

*******

*******

In: Computer Science

Coefficients Standard Error t-Stat    P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0% Intercept Calories...

Coefficients Standard Error t-Stat    P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0%
Intercept
Calories
Calories (x) Fat Content (y) Predicted y value Residual
140 7 5.75 1.25
160 8 6.77 1.23
70 2 2.18 -0.18
120 3.5 4.73 -1.23
170 16 7.28 8.72
290 12 13.4 -1.4
210 17 9.32 7.68
190 12 8.3 3.7
210 1.5 9.32 -7.82
130 3.5 5.24 -1.74
150 4.5 6.26 -1.76
160 12 6.77 5.23
150 7 6.26 0.74
140 6 5.75 0.25
180 4.5 7.79 -3.29
80 1 2.69 -1.69
200 7 8.81 -1.81
200 5 8.81 -3.81
180 7 7.79 -0.79
140 2.5 5.75 -3.

i need to fill in the top chart but with this given information but i have no idea what they are asking for or what calculations to do. i also do not know what my professor means by intercept

In: Statistics and Probability

You are in a world where there are only two assets, gold and U.S. stocks. You...

You are in a world where there are only two assets, gold and U.S. stocks. You are interested in investing your money in one, the other, or both assets. Consequently, you collect the following data on the returns on the two assets over the last six years.

Gold

Stock market

Average return

8% 20%

Standard deviation

25% 22%
Correlation - 0.4

1. If you were constrained to pick just one, which one would you choose? Explain.

(2) A friend argues that you must choose the gold. He tells you that the distribution of gold returns is positively skewed (while the distribution of stock returns is not skewed) and thinks that choosing the stock market ignores the big payoffs that you can occasionally get on gold. What would your response be? Explain. Hint: There is no right or wrong answer here, just write what you think and justify your position.

(3) How would a portfolio composed of equal proportions in gold and stocks do in terms of mean and variance? Explain and show your work.

(4) What are the proportions of gold and U.S. stocks in the minimum variance portfolio? Show your work in Excel and write your answer here.

(5) You now learn that GPEC (a cartel of gold-producing countries) is going to vary the amount of gold it produces with stock prices in the United States. (GPEC will produce less gold when stock markets are up and more when they are down.) What effect will this have on your portfolio? How would you change the composition of your portfolio? Explain.

In: Finance

(i) Design an 8-bit ripple adder which can add together two 8-bit numbers, inside a hierarchical...

(i) Design an 8-bit ripple adder which can add together two 8-bit numbers, inside a hierarchical block. Explain your design. Name your block with your student number: eg “123456 ripple adder”. (ii) Test your circuit in block form, showing four example additions with manual calculations to show they are correct. [

In: Electrical Engineering

Taussig Technologies Corporation (TTC) has been growing at a rate of 12% per year in recent...

Taussig Technologies Corporation (TTC) has been growing at a rate of 12% per year in recent years. This same growth rate is expected to last for another 2 years, then decline to gn = 7%.

  1. If D0 = $2.00 and rs = 12%, what is TTC's stock worth today? Do not round intermediate calculations. Round your answer to the nearest cent.
    $  

    What is its expected dividend yield at this time, that is, during Year 1? Do not round intermediate calculations. Round your answer to two decimal places.
      %

    What is its capital gains yields at this time, that is, during Year 1? Do not round intermediate calculations. Round your answer to two decimal places
  1. What will TTC's dividend and capital gains yields be once its period of supernormal growth ends? (Hint: These values will be the same regardless of whether you examine the case of 2 or 5 years of supernormal growth; the calculations are very easy.) Round your answers to two decimal places.

    Dividend yield:   %

    Capital gains yield:   %

In: Finance

Is there a difference between the means of occupancy rates in May and August? Answer your...

Is there a difference between the means of occupancy rates in May and August? Answer your question by calculating an approximate and appropriate symmetric 95% confidence interval using a Z statistic. Explain your findings

OR_MAY OR_AUG
60 97
86 99
93 99
89 96
74 90
81 84
83 99
71 99
90 98
83 97
77 99
82 97
90 98
81 98
20 90
87 95
48 94
60 96
45 98
80 95
65 91
60 95
75 90
15 70
16 66
97 100
74 94
62 97
40 85
82 97
24 76
49 98
16 93
60 86
42 73
68 87
55 86
75 93
35 95
0 95
40 80
40 40
10 80
83 90
50 100
77 98
81 99
37 96
27 90
49 96
53 98
60 97
80 100
58 95
64 93
65 100
68 98
75 100
55 84
60 95
56 96
10 100
85 95
4 77
24 92
85 98
75 92
44 84
45 95
0 70
34 92
35 95
70 98
65 99
15 90
40 100
10 90
10 90
35 70
50 100
2 95
0 80
3 90
30 90
15 80
83 95
91 99
85 100
80 90
50 100
79 94
92 98
87 99
84 97
65 98
86 94
62 92
70 95
87 97
87 99
50 97
61 97
59 99
77 100
46 95
81 94
48 98
15 98
80 100
52 99
90 97
90 99
75 90
20 100
10 90
30 100
53 99
52 99
90 97
53 92
48 98
84 96
90 97
35 98
25 95
35 100
10 95
10 90
60 100
70 92
3 78
10 90
10 90
75 100
10 70

In: Advanced Math

implement a Message Authentication Code program in either C/C++ or Python. See the following steps. 1....

implement a Message Authentication Code program in either C/C++ or Python.

See the following steps.

1. Accept a message as keyboard input to your program.

2. Accept a secret key for the sender/recipient as keyboard input to your program.

3. Your hash function H() is simply the checksum. To compute the checksum, you add all the characters of the string in ASCII codes. For example, the checksum of a string "TAMUC" would be 84 + 65 + 77 + 85 + 67 = 378.

Concatenate the secret key of the sender/recipient (from step 2) and the message (from step 1) and compute the checksum of the concatenated string. For ASCII codes, refer to the following website:

http://www.asciitable.com

4. Accept a secret key for the attacker as keyboard input to your program.

5. The attacker modifies the message from step 1. The original message can be modified any way you want.

6. Concatenate the secret key of the attacker (from step 4) and the modified message (from step 5) and compute the checksum of the concatenated string.

7. Concatenate the secret key of the sender/recipient (from step 2) and the modified message (from step 5) and compute the checksum of the concatenated string.

8. Compare the checksum from step 7 and the checksum from step 6. See if they match or not.

9. Compare the checksum from step 3 and the checksum from step 6. See if they match or not.

NOTE: your program should have separate functions for the checksum and the message modification by the attacker.

In: Computer Science

Implement a Message Authentication Code program in either C/C++ or Python. 1. Accept a message as...

Implement a Message Authentication Code program in either C/C++ or Python.

1. Accept a message as keyboard input to your program.

2. Accept a secret key for the sender/recipient as keyboard input to your program.

3. Your hash function H() is simply the checksum. To compute the checksum, you add all the characters of the string in ASCII codes. For example, the checksum of a string "TAMUC" would be 84 + 65 + 77 + 85 + 67 = 378.

Concatenate the secret key of the sender/recipient (from step 2) and the message (from step 1) and compute the checksum of the concatenated string. For ASCII codes, refer to the following website:

http://www.asciitable.com

4. Accept a secret key for the attacker as keyboard input to your program.

5. The attacker modifies the message from step 1. The original message can be modified any way you want.

6. Concatenate the secret key of the attacker (from step 4) and the modified message (from step 5) and compute the checksum of the concatenated string.

7. Concatenate the secret key of the sender/recipient (from step 2) and the modified message (from step 5) and compute the checksum of the concatenated string.

8. Compare the checksum from step 7 and the checksum from step 6. See if they match or not.

9. Compare the checksum from step 3 and the checksum from step 6. See if they match or not.

NOTE: your program should have separate functions for the checksum and the message modification by the attacker.

In: Computer Science