This website uses cookies to ensure you have the best experience. Learn more

Programming Languages 101 Essay

1095 words - 5 pages

Case 1: Century National Bank Checking Account Customers

Century National Bank has offices in several cities in the Midwest and in the southeastern part of the U.S. Dr. Robert Lindhal, president and CEO, would like to know the characteristics of his checking account customers. He asked Ms. Sofia Kovalevskaya, Director of Planning, to select a sample of customers and prepare a report. Assume that you work in the Planning Department of the Century National Bank and that you report to Ms. Kovalevskaya. She has called a meeting to discuss this project and has selected you to head a team of three employees of the department to take a random sample of customers and prepare a report for ...view middle of the document...

Decide whether a five number summary, or the mean and standard deviation better describe the data.

6. Prepare a box-and-whisker plot for all account balances.

7. Prepare side-by-side box-and-whisker plots of account balances for customers who have debit cards vs customers who do not have debit cards. What can you conclude from this?

8. Prepare side-by-side box-and-whisker plots of account balances for customers who receive interest on their checking accounts vs those who do not. What can you conclude from this?

9. Prepare side-by-side box-and-whisker plots for account balances for customers from each of the four locations, Cincinnati, Louisville, Eerie, and Atlanta. What can you conclude from this?

10. Prepare a scatter plot for the monthly account balances vs the number of ATM transactions used in the month. Explain the relationship and what this means.

Attempt to provide this information to Dr. Lindhal in a succinct, informative, and visually appealing way. Make sure to check spelling and grammar to avoid major mistakes. Organize the report well, using a formal and professional style.
Figure 1. Century National Bank Case Data.
X1=Account balance in $
X2=Number of ATM transactions in the month
X3=Number of other bank services used
X4=Has a debit card (1=Yes, 0 = No)
X5=Receives interest on the account (1=Yes, 0=No)
X6=City where banking is done (1=Cincinnati, OH, 2=Atlanta, GA, 3=Louisville, KY, 4=Erie, PA)

x1 x2 x3 x4 x5 x6
$1,756 13 4 1 1 2
$748 9 2 1 0 1
$1,501 10 1 1 0 1
$1,831 10 4 1 1 3
$1,622 14...

Other Papers Like Programming Languages 101

Test Essay

5524 words - 23 pages ........................................................................................ 45 7 HTML Tutorial Example ............................................................................................. 45 Programming Variables .......................................................................... 46 Example ............................................................................................. 46 Program Output

Ch1 Mis Essay

4614 words - 19 pages Ref: 14 28) Logical design is tied to a specific hardware and software platform. Answer: FALSE Diff: 2 Page Ref: 15 29) During logical design, the analyst team decides which programming languages the computer instructions should be written in, which database systems and file structures will be used for the data, and which hardware platform, operating system, and network environment the system will run under. Answer: FALSE Diff: 3

Case Anal

4317 words - 18 pages various innovations in the online advertising market that helped make them one of the biggest brokers in the market. Using technology from the company DoubleClick, Google can determine user interests and target advertisements so they are relevant to their context and the user that is viewing them.[101][102] Google Analytics allows website owners to track where and how people use their website, for example by examining click rates for all the links

No Sql Databases

4265 words - 18 pages between implementation in various programming language [30]. 5. B.2 Operations: MongoDB allows these operations:  Insert – Adds new documents to a collection.  Find – Retrieves documents from a collection.  Update– Updates documents of a collection.  Remove – Removes a document from a collection [23][10]. 5. B.3 Security Since Mongo data files are unencrypted, they are prone to attacks. To lessen this, the

Asignment

3234 words - 13 pages Units .......................................................................................................... Overview of Java ............................................................................................................................. Overview of Application Programming Languages (APIs) ..................................................... Overview of Transactions

Gsl Scientific Library

4796 words - 20 pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 Chapter 1: Introduction 1 1 Introduction The GNU Scientific Library (GSL) is a collection of routines for numerical computing. The routines have been written from scratch in C, and present a modern Applications Programming Interface (API) for C programmers, allowing wrappers to be written for very high level languages. The source code is distributed under the GNU General Public License. 1.1 Routines available in GSL

Principles Of Information Security

3291 words - 14 pages someone else. There are generally two skill levels among hackers. The first is the expert hacker, or elite hacker, who develops software scripts and program exploits used by those in the second category, the novice or unskilled hacker. The expert hacker is usually a master of several programming languages, networking protocols, and operating systems and also exhibits a mastery of the technical environment of the chosen targeted system. As described in

Principles of Information Security

3241 words - 13 pages several programming languages, networking protocols, and operating systems and also exhibits a mastery of the technical environment of the chosen targeted system. As described in the Offline section, Hack PCWeek expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems. Once an expert hacker chooses a target system, the likelihood that he or she will

Computer System Security

3291 words - 14 pages someone else. There are generally two skill levels among hackers. The first is the expert hacker, or elite hacker, who develops software scripts and program exploits used by those in the second category, the novice or unskilled hacker. The expert hacker is usually a master of several programming languages, networking protocols, and operating systems and also exhibits a mastery of the technical environment of the chosen targeted system. As described in

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Related Essays

Java Programming Essay

925 words - 4 pages Credit Units 20 0 20 200 Level Course Code 1st Semester GST 201 CIT 211 GST 203 CIT 213 CIT 215 CIT 237 MTH 211 MTH 213 MTH 241 MTH 281 Course Titles Unit(s) Status Nigerian Peoples and Cultures Introduction to Operating Systems Introduction to Philosophy and Logic Elementary Data Processing Introduction to Programming Languages Programming & Algorithms Introduction to Set Theory and Abstract Algebra Numerical Analysis I Introduction to

Hostel Management Essay

5222 words - 21 pages 104 Beckmann 5000 105 Gracy 106 Monalisa 107 Xavier ------------------------------------------------- PL-SQL: PL/SQL stands for Procedural Language extension of SQL. PL/SQL is a combination of SQL along with the procedural features of programming languages. Each PL/SQL program consists of SQL and PL/SQL statements which from a PL/SQL block. A PL/SQL Block consists of three

Visual Basic Preview

5065 words - 21 pages number of files have been installed and the license terms accepted, a screen will appear providing the option to select the features to be installed: Visual Studio supports a number of different programming languages in addition to Visual Basic (such as C#, F# and C++). If you only plan to use Visual Basic then choose the custom installation option and uncheck the boxes for the other languages. This will both speed up the installation process

Improving Byzantine Fault Tolerance Using Concurrent Information

2744 words - 11 pages previously visualized results as a basis for all of these assumptions. This seems to hold in most cases. Figure 2: The relationship between WABBLE and multi-processors. Our algorithm relies on the theoretical model outlined in the recent foremost work by Qian in the field of programming languages. Although system administrators usually hypothesize the exact opposite, our heuristic depends on this property for correct behavior. Any