This website uses cookies to ensure you have the best experience. Learn more

Data File Essay

1365 words - 6 pages

Data File 5

Chapter Nine

Show all work

Problem 1)

A skeptical paranormal researcher claims that the proportion of Americans that have seen a UFO is less than 1 in every one thousand. State the null hypothesis and the alternative hypothesis for a test of significance.

Problem 2)

At one school, the average amount of time that tenth-graders spend watching television each week is 18.4 hours. The principal introduces a campaign to encourage the students to watch less television. One year later, the principal wants to perform a hypothesis test to determine whether the average amount of time spent watching television per week has decreased. Formulate the null and ...view middle of the document...

13.0 13.0
7.0 5.0
5.0 15.0
14.0 18.0
8.0 12.0
10.0 7.0
3.0 15.0
4.0 3.0

a) Conduct a one-sample t-test. What is the t-test score? What is the mean? Was the test significant? If it was significant at what P-value level was it significant?
b) What is your null and alternative hypothesis? Given the results did you reject or fail to reject the null and why?
(Use instructions on page 349 of your textbook, under Hypothesis Tests with the t Distribution to conduct SPSS or Excel analysis).

Problem 2)

Billie wishes to test the hypothesis that overweight individuals tend to eat faster than normal-weight individuals. To test this hypothesis, she has two assistants sit in a McDonald’s restaurant and identify individuals who order the Big Mac special for lunch. The Big Mackers as they become known are then classified by the assistants as overweight, normal weight, or neither overweight nor normal weight. The assistants identify 10 overweight and 10 normal weight Big Mackers. The assistants record the amount of time it takes them to eat the Big Mac special.

1.0 585.0
1.0 540.0
1.0 660.0
1.0 571.0
1.0 584.0
1.0 653.0
1.0 574.0
1.0 569.0
1.0 619.0
1.0 535.0
2.0 697.0
2.0 782.0
2.0 587.0
2.0 675.0
2.0 635.0
2.0 672.0
2.0 606.0
2.0 789.0
2.0 806.0
2. 600.0

a) Compute an independent-samples t-test on these data. Report the t-value and the p values. Were the results significant? (Do the same thing you did for the t-test above, only this time when you go to compare means, click on independent samples t-test. When you enter group variable into grouping variable area, it will ask you to define the variables. Click define groups and place the number 1 into 1 and the number 2 into 2).
b) What is the difference between the mean of the two groups? What is the difference in the standard deviation?
c) What is the null and alternative hypothesis? Do the data results lead you to reject or fail to reject the null hypothesis?
d) What do the results tell you?

Problem 3)

Lilly collects data on a sample of 40 high school students to evaluate whether the proportion of female high school students who take advanced math courses in high school varies depending upon whether they have been raised primarily by their father or by both their mother and their father. Two variables are found below in the data file: math (0 = no advanced math and 1 = some advanced math) and Parent (1= primarily father...

Other Papers Like Data File

File Management Pos-355 Essay

2115 words - 9 pages .” In Unix the directories are separated by a slash like: /usr/Docs/robert/data/syllabus.doc. In Unix/Linux file permissions are set up in three groups: user or owner, group, and other. to set up permissions on a directory it uses the same user groups but when setting permissions you would place a "d" at the beginning of the segment. Using an ACL (access control list) is how the system administrator would set up permission for users and groups

Project Part 2 Task 1 Essay

588 words - 3 pages Project Part 2 Task 1: Secure File Storage Server Scenario There is a requirement to read customer confidential data located in the local area network (LAN) of First World Bank Savings and Loan. The organization needs to deliver highly confidential customer data in Portable Document Format (PDF) format for its online customers. This data is typically uploaded to a Linux file server by the bank employees within the LAN. However, online

Chapter 1 Essay

852 words - 4 pages Page 31, #1-10 1. Define each of the following terms: a. Data i. Raw facts, information that has not yet been process to reveal their meaning. b. Field i. A character or group of characters that has a specific meaning used to define and store data. c. Record i. A logically connected set of one or more fields that describes a person, place, or thing. d. File i. A collection of related records. 2. What is data redundancy, and which

File Management

902 words - 4 pages users, the third method can be seen as more complicated for average users but increasingly streamlined for the computer professional. Operating systems can also use specific identity codes to determine the file type and extensions. For example, UNIX makes use of a number code system that determines how and with what application or program that file will be accessed with. This code relies directly on the type of information or data stored on the

Intro to Programming

849 words - 4 pages . 18. Defense programming: A practice of anticipating errors that can happen while a program is r unning, and designing the program to avoid those errors. 19. Error trap: A validation loop is also known as an error trap. 20. Input Validation: The process of validating the data that is entered as input. 21. Output file: A file that is written to. It is called an output file because the program stores out-put in it. 22. Input

Buisness Ethics

534 words - 3 pages data base. Location Code for each Box number will be given prior to import of data. This document contains storage rack diagram. Box location is rack number, shelf number and box sequence number. There will be 3 forms Inward, Outward and locate box / file. These are given with the data to be captured for the purpose of IW, OW and locate. There will be reports for current and history for files and box movement i.e. based on the transactions i.e. IW


924 words - 4 pages scheduled commands |   | | crontab | Schedule a command to run at a later time |   | | csplit | Split a file into context-determined pieces |   | | cut | Divide a file into several parts |   | | date | Display or change the date & time |   | | dc | Desk Calculator |   | | dd | Data Dump - Convert and copy a file |   | | df | Display free disk space |   | | diff | Display the differences between two files |   | | diff3

Programming Final

1006 words - 5 pages over. 40. Boolean expression with an AND in it both expressions have to be true. 41. “writing data to” is the process of saving data to a file. 42. “reading data from” is the process of retrieving data from a file. input file is used to describe a file that data is read from. 43. Output file is used to describe a file that data is written to, because the program stores output in it. 44. Process the file is the step data is either written to

Mis Tutorial Answer Sheet

1013 words - 5 pages Review Questions 1. What are the problems of managing data resources in a traditional file environment and how are they solved by a database management system? List and describe each of the components in the data hierarchy. Figure 6–1 shows the data hierarchy. The data hierarchy includes bits, bytes, fields, records, files, and databases. Data are organized in a hierarchy that starts with the bit, which is represented by either a 0

Chapter 1

4742 words - 19 pages , CUST_STATE, CUST_ZIPCODE, CUST_AREACODE, and CUST_PHONE. d. file Historically, a collection of file folders, properly tagged and kept in a filing cabinet. Although such manual files still exist, we more commonly think of a (computer) file as a collection of related records that contain information of interest to the end user. For example, a sales organization is likely to keep a file containing customer data. Keep in mind that the

Computer Forensics Tools

1779 words - 8 pages Computer Forensics Tools Strayer University E-Support Undelete Plus is powerful software that can quickly scan a computer or storage medium for deleted files and restore them on command. It works with computers, flash drives, cameras, and other forms of data storage. Deleting a file from your computer, flash disk, camera, or the like does not mean it is lost forever. Software doesn’t destroy files when it deletes, it simply marks

Related Essays

Data File 5 Essay

1365 words - 6 pages Data File 5 Chapter Nine Show all work Problem 1) A skeptical paranormal researcher claims that the proportion of Americans that have seen a UFO is less than 1 in every one thousand. State the null hypothesis and the alternative hypothesis for a test of significance. Problem 2) At one school, the average amount of time that tenth-graders spend watching television each week is 18.4 hours. The principal introduces a

Pt1420 Unit 10 Essay

633 words - 3 pages PT1420 Unit 10 Assignment Homework True or False 1. When working with a sequential access file, you can jump directly to any piece of data in the file without reading the data that comes before it. False 2. In most languages, when you open an output file and that file already exists on the disk, the contents of the existing file will be erased. True 4. The purpose of an EOF marker is to indicate where a field ends. Files typically

Operating Systems Assignment 2

934 words - 4 pages ditaruh secara berurutan dalam barisan memori.Keuntungan dari penggunaan contiguous memory allocation adalah performa dan kecepatan membaca data secara sequential dan direct access. Jumlah disk seek yang diperlukan juga lebih sedikit.Kelemahan dari penggunaan contiguous memory allocation adalah adanya fragmentasi.Ketika data dihapus, data baru akan disimpan pada index yang terakhir, sehingga hanya menggunakan single entry pada FAT (File Allocation

Nt1410 Exercise 3 1 Essay

1023 words - 5 pages end utilizer can utilize it facilely. Procfs: The proc file system acts as an interface to internal data structures in the kernel. It can be acclimated to obtain information about the system and to transmute certain kernel parameters at runtime utilizing sysctl command. With Linux (Fedora) being open source, file systems can be tweaked and changed to how the end user prefers. I believe this makes the Linux file system the most user friendly