Suppose that the following data represents ages of all tenured faculty members in a certain academic department, and we want to numerically describe the age distribution for this department only:
42, 39, 44, 50, 45, 42, 36, 47, 39, 42, 43, 47
What is the 3rd quartile?
In: Statistics and Probability
Case Study: Shannon
Shannon is a 30-year-old woman preparing to run her first marathon. She regularly runs 30km per week, attends the gym three times per week doing a mix of cardio- and weight training sessions and also plays touch football once a week in a social work team. She is up early most mornings and when she does not run will either practice yoga at home or do a 30- to 40-minute power walk.
Shannon ran competitively throughout secondary school, eventually stopping after a series of stress fractures. At the time, she was particularly sensitive about her weight and body composition as she was serious about becoming an elite distance runner and her coach regularly made comment about achieving a low body fat content. He would also assess body composition every month during the season using a ‘pinch test’; a test Shannon particularly hated.
Shannon’s current diet:
BF: 2 Hi Bran (Sanitarium) breakfast biscuits with no-fat soy milk, sliced banana and 1 tbsp of processed bran. Glass of juice
Lunch: Wholemeal lavash bread with hommus, 60 g of chopped chicken pieces, avocado and salad. Piece of fruit
Dinner: Dahl with brown rice and large side salad Handful of dried fruit, nut and seed mix.
Supper: Fresh fruit × 1–2 pieces. Warm mug of carob made on no-fat soy milk
With twelve weeks to go before the marathon, Shannon has joined a running group that effectively doubled her weekly training distance to around 85 km. She is married, works full-time as an environmental economist and has no children, although has been thinking about children in the not-too-distant future.
Shannon now reports losing 3 kg over the first six weeks of the running group attendance; however, she felt this was a great result as she had almost returned to her old running weight. However, she reports that she is feeling excessively fatigued, and found that although, initially she seemed to be running well within her new training group, she has begun to struggle to maintain pace during the long group runs. She has persisted with her weight and cardio-sessions, along with her morning walks but recently found that she started to miss sessions because she lacks energy.
What suggestions would you make about Shannon's exercise program?
What do you need to consider when assessing the nutrient needs of an athlete?
In: Biology
IN C++ PLEASE
Requirements
Write a program that takes in user input of two integer numbers for height and width and uses a nested for loop to make a rectangle out of asterixes. The creation of the rectangle (i.e. the nested for loop) should occur in a void function that takes in 2 parameters, one for height and one for width. Make sure your couts match the sample output (copy and paste from those couts so you don't make a simple error). The Pre and Post condition should be a comment above the prototype; it should specify invalid input (there is no requirement for output on invalid input and it is not tested).
Rubric
-void function prototype, pre post comment, and definition matching prototype, and function called correctly 3 pts
-user input prompted and input accepted 2 pts
-correct bounds on the nested for loop 2 pts
-correct output 3 pts
Sample output (output in bold, input in nonbold):
What height do you want your rectangle?
5
What width do you want your rectangle?
5
*****
*****
*****
*****
*****
What height do you want your rectangle?
3
What width do you want your rectangle?
10
**********
**********
**********
What height do you want your rectangle?
6
What width do you want your rectangle?
2
**
**
**
**
**
**
What height do you want your rectangle?
10
What width do you want your rectangle?
7
*******
*******
*******
*******
*******
*******
*******
*******
*******
*******
In: Computer Science
| Coefficients | Standard Error | t-Stat | P-value | Lower 95% | Upper 95% | Lower 95.0% | Upper 95.0% | |
| Intercept | ||||||||
| Calories |
| Calories (x) | Fat Content (y) | Predicted y value | Residual |
| 140 | 7 | 5.75 | 1.25 |
| 160 | 8 | 6.77 | 1.23 |
| 70 | 2 | 2.18 | -0.18 |
| 120 | 3.5 | 4.73 | -1.23 |
| 170 | 16 | 7.28 | 8.72 |
| 290 | 12 | 13.4 | -1.4 |
| 210 | 17 | 9.32 | 7.68 |
| 190 | 12 | 8.3 | 3.7 |
| 210 | 1.5 | 9.32 | -7.82 |
| 130 | 3.5 | 5.24 | -1.74 |
| 150 | 4.5 | 6.26 | -1.76 |
| 160 | 12 | 6.77 | 5.23 |
| 150 | 7 | 6.26 | 0.74 |
| 140 | 6 | 5.75 | 0.25 |
| 180 | 4.5 | 7.79 | -3.29 |
| 80 | 1 | 2.69 | -1.69 |
| 200 | 7 | 8.81 | -1.81 |
| 200 | 5 | 8.81 | -3.81 |
| 180 | 7 | 7.79 | -0.79 |
| 140 | 2.5 | 5.75 | -3. |
i need to fill in the top chart but with this given information but i have no idea what they are asking for or what calculations to do. i also do not know what my professor means by intercept
In: Statistics and Probability
You are in a world where there are only two assets, gold and U.S. stocks. You are interested in investing your money in one, the other, or both assets. Consequently, you collect the following data on the returns on the two assets over the last six years.
| Gold |
Stock market |
|
|
Average return |
8% | 20% |
|
Standard deviation |
25% | 22% |
| Correlation | - 0.4 |
1. If you were constrained to pick just one, which one would you choose? Explain.
(2) A friend argues that you must choose the gold. He tells you that the distribution of gold returns is positively skewed (while the distribution of stock returns is not skewed) and thinks that choosing the stock market ignores the big payoffs that you can occasionally get on gold. What would your response be? Explain. Hint: There is no right or wrong answer here, just write what you think and justify your position.
(3) How would a portfolio composed of equal proportions in gold and stocks do in terms of mean and variance? Explain and show your work.
(4) What are the proportions of gold and U.S. stocks in the minimum variance portfolio? Show your work in Excel and write your answer here.
(5) You now learn that GPEC (a cartel of gold-producing countries) is going to vary the amount of gold it produces with stock prices in the United States. (GPEC will produce less gold when stock markets are up and more when they are down.) What effect will this have on your portfolio? How would you change the composition of your portfolio? Explain.
In: Finance
(i) Design an 8-bit ripple adder which can add together two 8-bit numbers, inside a hierarchical block. Explain your design. Name your block with your student number: eg “123456 ripple adder”. (ii) Test your circuit in block form, showing four example additions with manual calculations to show they are correct. [
In: Electrical Engineering
Taussig Technologies Corporation (TTC) has been growing at a rate of 12% per year in recent years. This same growth rate is expected to last for another 2 years, then decline to gn = 7%.
In: Finance
Is there a difference between the means of occupancy rates in May and August? Answer your question by calculating an approximate and appropriate symmetric 95% confidence interval using a Z statistic. Explain your findings
| OR_MAY | OR_AUG |
| 60 | 97 |
| 86 | 99 |
| 93 | 99 |
| 89 | 96 |
| 74 | 90 |
| 81 | 84 |
| 83 | 99 |
| 71 | 99 |
| 90 | 98 |
| 83 | 97 |
| 77 | 99 |
| 82 | 97 |
| 90 | 98 |
| 81 | 98 |
| 20 | 90 |
| 87 | 95 |
| 48 | 94 |
| 60 | 96 |
| 45 | 98 |
| 80 | 95 |
| 65 | 91 |
| 60 | 95 |
| 75 | 90 |
| 15 | 70 |
| 16 | 66 |
| 97 | 100 |
| 74 | 94 |
| 62 | 97 |
| 40 | 85 |
| 82 | 97 |
| 24 | 76 |
| 49 | 98 |
| 16 | 93 |
| 60 | 86 |
| 42 | 73 |
| 68 | 87 |
| 55 | 86 |
| 75 | 93 |
| 35 | 95 |
| 0 | 95 |
| 40 | 80 |
| 40 | 40 |
| 10 | 80 |
| 83 | 90 |
| 50 | 100 |
| 77 | 98 |
| 81 | 99 |
| 37 | 96 |
| 27 | 90 |
| 49 | 96 |
| 53 | 98 |
| 60 | 97 |
| 80 | 100 |
| 58 | 95 |
| 64 | 93 |
| 65 | 100 |
| 68 | 98 |
| 75 | 100 |
| 55 | 84 |
| 60 | 95 |
| 56 | 96 |
| 10 | 100 |
| 85 | 95 |
| 4 | 77 |
| 24 | 92 |
| 85 | 98 |
| 75 | 92 |
| 44 | 84 |
| 45 | 95 |
| 0 | 70 |
| 34 | 92 |
| 35 | 95 |
| 70 | 98 |
| 65 | 99 |
| 15 | 90 |
| 40 | 100 |
| 10 | 90 |
| 10 | 90 |
| 35 | 70 |
| 50 | 100 |
| 2 | 95 |
| 0 | 80 |
| 3 | 90 |
| 30 | 90 |
| 15 | 80 |
| 83 | 95 |
| 91 | 99 |
| 85 | 100 |
| 80 | 90 |
| 50 | 100 |
| 79 | 94 |
| 92 | 98 |
| 87 | 99 |
| 84 | 97 |
| 65 | 98 |
| 86 | 94 |
| 62 | 92 |
| 70 | 95 |
| 87 | 97 |
| 87 | 99 |
| 50 | 97 |
| 61 | 97 |
| 59 | 99 |
| 77 | 100 |
| 46 | 95 |
| 81 | 94 |
| 48 | 98 |
| 15 | 98 |
| 80 | 100 |
| 52 | 99 |
| 90 | 97 |
| 90 | 99 |
| 75 | 90 |
| 20 | 100 |
| 10 | 90 |
| 30 | 100 |
| 53 | 99 |
| 52 | 99 |
| 90 | 97 |
| 53 | 92 |
| 48 | 98 |
| 84 | 96 |
| 90 | 97 |
| 35 | 98 |
| 25 | 95 |
| 35 | 100 |
| 10 | 95 |
| 10 | 90 |
| 60 | 100 |
| 70 | 92 |
| 3 | 78 |
| 10 | 90 |
| 10 | 90 |
| 75 | 100 |
| 10 | 70 |
In: Advanced Math
implement a Message Authentication Code program in either C/C++ or Python.
See the following steps.
1. Accept a message as keyboard input to your program.
2. Accept a secret key for the sender/recipient as keyboard input to your program.
3. Your hash function H() is simply the checksum. To compute the checksum, you add all the characters of the string in ASCII codes. For example, the checksum of a string "TAMUC" would be 84 + 65 + 77 + 85 + 67 = 378.
Concatenate the secret key of the sender/recipient (from step 2) and the message (from step 1) and compute the checksum of the concatenated string. For ASCII codes, refer to the following website:
http://www.asciitable.com
4. Accept a secret key for the attacker as keyboard input to your program.
5. The attacker modifies the message from step 1. The original message can be modified any way you want.
6. Concatenate the secret key of the attacker (from step 4) and the modified message (from step 5) and compute the checksum of the concatenated string.
7. Concatenate the secret key of the sender/recipient (from step 2) and the modified message (from step 5) and compute the checksum of the concatenated string.
8. Compare the checksum from step 7 and the checksum from step 6. See if they match or not.
9. Compare the checksum from step 3 and the checksum from step 6. See if they match or not.
NOTE: your program should have separate functions for the checksum and the message modification by the attacker.
In: Computer Science
Implement a Message Authentication Code program in either C/C++ or Python.
1. Accept a message as keyboard input to your program.
2. Accept a secret key for the sender/recipient as keyboard input to your program.
3. Your hash function H() is simply the checksum. To compute the checksum, you add all the characters of the string in ASCII codes. For example, the checksum of a string "TAMUC" would be 84 + 65 + 77 + 85 + 67 = 378.
Concatenate the secret key of the sender/recipient (from step 2) and the message (from step 1) and compute the checksum of the concatenated string. For ASCII codes, refer to the following website:
http://www.asciitable.com
4. Accept a secret key for the attacker as keyboard input to your program.
5. The attacker modifies the message from step 1. The original message can be modified any way you want.
6. Concatenate the secret key of the attacker (from step 4) and the modified message (from step 5) and compute the checksum of the concatenated string.
7. Concatenate the secret key of the sender/recipient (from step 2) and the modified message (from step 5) and compute the checksum of the concatenated string.
8. Compare the checksum from step 7 and the checksum from step 6. See if they match or not.
9. Compare the checksum from step 3 and the checksum from step 6. See if they match or not.
NOTE: your program should have separate functions for the checksum and the message modification by the attacker.
In: Computer Science